Instruction Usage in Evolving Polymorphic Viruses

نویسندگان

  • Maria Lau
  • Christopher Wee
  • Julie Lang
چکیده

1 This research sponsored under grant F96-F154000-000NC, Office of Research and Development, CIA. Maria is an undergraduate (Junior) pursuing a BSEE in the Department of Electrical Engineering. Her research mentored by Dr. Wee, under the Women’s Engineering Link Mentorship program. Dr. Matt Bishop is her faculty sponsor. Christopher is a post-doctoral researcher in the Computer Security Laboratory. Julie is a graduate student pursuing a MSCS; her thesis concerns polymorphic virus detection. Address: 2245 EUII, Dept. of Computer Science, UC Davis. http://seclab.cs.ucdavis.edu/misuse. Abstract

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Human Virome

Viruses are dominant entities in the biosphere and parasitize all cellular life forms. The relative abundances of different classes of viruses are dramatically different between prokaryotes and eukaryotes. In marine, soil and animal-associated environments, virus particles consistently outnumber cells by one to two orders of magnitude. It is estimated that 10 quintillion (1030) viral particles ...

متن کامل

کاربست نظریه هوش های چندگانه گاردنر در آموزش و یادگیری

Introduction: In the past decades, usage of multiple intelligence theory based on postmodernism prepared advanced suitable conditions for students in learning. Aim: this research is answer these two questions what is characteristics of multiple intelligence and usage instruction and learning? Method: the current study is review paper with key’s words multiple intelligence, instruction, an...

متن کامل

Virus-Host Coevolution: Common Patterns of Nucleotide Motif Usage in Flaviviridae and Their Hosts

Virus-host biological interaction is a continuous coevolutionary process involving both host immune system and viral escape mechanisms. Flaviviridae family is composed of fast evolving RNA viruses that infects vertebrate (mammals and birds) and/or invertebrate (ticks and mosquitoes) organisms. These host groups are very distinct life forms separated by a long evolutionary time, so lineage-speci...

متن کامل

Callgraph properties of executables

All commercial antivirus (AV) products rely on signature matching; the bulk of which constitutes strict byte sequence pattern matching. For modern, evolving polymorphic and metamorphic malware, this approach is unsatifactory. Clementi recently checked fifteen state-of-the-art, updated AV scanner against ten highly polymorphic malware samples and found false negative rates from 090%, with an ave...

متن کامل

Analyzing Network Traffic To Detect Self-Decrypting

Remotely-launched software exploits are a common way for attackers to intrude into vulnerable computer systems. As detection techniques improve, remote exploitation techniques are also evolving. Recent techniques for evasion of exploit detection include polymorphism (code encryption) and metamorphism (code obfuscation). This paper addresses the problem of detecting in network traffic polymorphi...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2007