Detection of polymorphic viruses in windows executables
From MaRDI portal
Publication:3058905
DOI10.1007/978-3-642-14825-5_11zbMATH Open1211.68116OpenAlexW1563542718MaRDI QIDQ3058905FDOQ3058905
Authors: Abhiram Kasina, Amit Suthar, Rajeev Kumar
Publication date: 7 December 2010
Published in: Communications in Computer and Information Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-14825-5_11
Recommendations
- Using algebraic models of programs for detecting metamorphic malwares
- On the infeasibility of modeling polymorphic shellcode. Re-thinking the role of learning in intrusion detection systems
- Boosting scalability in anomaly-based packed executable filtering
- Modelling metamorphism by abstract interpretation
- Automatic malware analysis. An emulator based approach.
malware analysisdynamic analysisreverse engineeringcode obfuscationcode analysismalware packingpolymorphic virus
Cited In (2)
This page was built for publication: Detection of polymorphic viruses in windows executables
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3058905)