Instruction Usage in Evolving Polymorphic Viruses
نویسندگان
چکیده
1 This research sponsored under grant F96-F154000-000NC, Office of Research and Development, CIA. Maria is an undergraduate (Junior) pursuing a BSEE in the Department of Electrical Engineering. Her research mentored by Dr. Wee, under the Women’s Engineering Link Mentorship program. Dr. Matt Bishop is her faculty sponsor. Christopher is a post-doctoral researcher in the Computer Security Laboratory. Julie is a graduate student pursuing a MSCS; her thesis concerns polymorphic virus detection. Address: 2245 EUII, Dept. of Computer Science, UC Davis. http://seclab.cs.ucdavis.edu/misuse. Abstract
منابع مشابه
Human Virome
Viruses are dominant entities in the biosphere and parasitize all cellular life forms. The relative abundances of different classes of viruses are dramatically different between prokaryotes and eukaryotes. In marine, soil and animal-associated environments, virus particles consistently outnumber cells by one to two orders of magnitude. It is estimated that 10 quintillion (1030) viral particles ...
متن کاملکاربست نظریه هوش های چندگانه گاردنر در آموزش و یادگیری
Introduction: In the past decades, usage of multiple intelligence theory based on postmodernism prepared advanced suitable conditions for students in learning. Aim: this research is answer these two questions what is characteristics of multiple intelligence and usage instruction and learning? Method: the current study is review paper with key’s words multiple intelligence, instruction, an...
متن کاملVirus-Host Coevolution: Common Patterns of Nucleotide Motif Usage in Flaviviridae and Their Hosts
Virus-host biological interaction is a continuous coevolutionary process involving both host immune system and viral escape mechanisms. Flaviviridae family is composed of fast evolving RNA viruses that infects vertebrate (mammals and birds) and/or invertebrate (ticks and mosquitoes) organisms. These host groups are very distinct life forms separated by a long evolutionary time, so lineage-speci...
متن کاملCallgraph properties of executables
All commercial antivirus (AV) products rely on signature matching; the bulk of which constitutes strict byte sequence pattern matching. For modern, evolving polymorphic and metamorphic malware, this approach is unsatifactory. Clementi recently checked fifteen state-of-the-art, updated AV scanner against ten highly polymorphic malware samples and found false negative rates from 090%, with an ave...
متن کاملAnalyzing Network Traffic To Detect Self-Decrypting
Remotely-launched software exploits are a common way for attackers to intrude into vulnerable computer systems. As detection techniques improve, remote exploitation techniques are also evolving. Recent techniques for evasion of exploit detection include polymorphism (code encryption) and metamorphism (code obfuscation). This paper addresses the problem of detecting in network traffic polymorphi...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2007