Abstract In this paper, we analyze several metamor-phic virus generators. We define a similarity index and use it to precisely quantify the degree of metamorphism that each generator produces. Then we present a detec-tor based on hidden Markov models and we consider a simpler detection method based on our similarity index. Both of these techniques detect all of the metamorphic viruses in our test set with extremely high accuracy. In addition, we show that popular commercial virus scan-ners do not detect the highlymetamorphic virus variants in our test set.
Malware is a serious threat to the security of the system. With the widespread use of the World Wide...
Metamorphic computer virus employs various code mutation techniques to change its code to become new...
http://www.springerlink.com/content/175414336v882211/International audienceIn this paper, we propose...
*Corresponding author Abstract: Metamorphic viruses modify their code to produce viral copies that a...
Virus writers and anti-virus researches generally agree that metamorphism is the way to generate un...
Commercial anti-virus scanners are generally signature based, that is, they scan for known patterns ...
Recent research work shows that HMM (Hidden Markov Model) is widely used in metamorphic virus detect...
For the past two decades, computer viruses have been a constant security threat. A computer virus is...
Computer viruses and other forms of malware have viewed as a threat to any software system. A comput...
Abstract — Metamorphic viruses engage different mutation techniques to escape from string signature ...
Metamorphic viruses modify their own code to produce viral copies which are syntactically different ...
Computer viruses and other forms of malware have viewed as a threat to any software system. They hav...
Metamorphic viruses engage different mutation techniques to escape from string signature based scan...
Metamorphic malware changes the structure of its code from infection to infection. This makes it ver...
International audienceIn this paper, we present the design of a metamorphic engine representing a ty...
Malware is a serious threat to the security of the system. With the widespread use of the World Wide...
Metamorphic computer virus employs various code mutation techniques to change its code to become new...
http://www.springerlink.com/content/175414336v882211/International audienceIn this paper, we propose...
*Corresponding author Abstract: Metamorphic viruses modify their code to produce viral copies that a...
Virus writers and anti-virus researches generally agree that metamorphism is the way to generate un...
Commercial anti-virus scanners are generally signature based, that is, they scan for known patterns ...
Recent research work shows that HMM (Hidden Markov Model) is widely used in metamorphic virus detect...
For the past two decades, computer viruses have been a constant security threat. A computer virus is...
Computer viruses and other forms of malware have viewed as a threat to any software system. A comput...
Abstract — Metamorphic viruses engage different mutation techniques to escape from string signature ...
Metamorphic viruses modify their own code to produce viral copies which are syntactically different ...
Computer viruses and other forms of malware have viewed as a threat to any software system. They hav...
Metamorphic viruses engage different mutation techniques to escape from string signature based scan...
Metamorphic malware changes the structure of its code from infection to infection. This makes it ver...
International audienceIn this paper, we present the design of a metamorphic engine representing a ty...
Malware is a serious threat to the security of the system. With the widespread use of the World Wide...
Metamorphic computer virus employs various code mutation techniques to change its code to become new...
http://www.springerlink.com/content/175414336v882211/International audienceIn this paper, we propose...