Detection of Logic Bombs
Journal: International Journal of Engineering Sciences & Research Technology (IJESRT) (Vol.3, No. 2)Publication Date: 2014-02-28
Authors : Ankur Singh Bist;
Page : 777-779
Keywords : logic bombs; Malicious Codes.;
Abstract
Computer viruses are big threat to computer world; researchers doing work in this area have made various efforts in the direction of classification and detection methods of these viruses. Graph mining, system call arrangement and CFG analysis are some latest research activities in this field. The computability theory and the semi computable functions are quite important in our context of analyzing malicious activities. A mathematical model like random access stored program machine with the association of attached background is used by Ferenc Leitold while explaining modeling of viruses in his paper. Computer viruses like polymorphic viruses and metamorphic viruses use more efficient techniques for their evolution so it is required to use strong models for understanding their evolution and then apply detection followed by the process of removal. Code Emulation is one of the strongest ways to analyze computer viruses but the anti-emulation activities made by virus designers are also active. This paper involves the study of logic bombs.
Other Latest Articles
- EPIDEMIOLOGICAL ASPECTS OF MALNUTRITION IN CHILDREN LESS THAN FIVE YEARS ADMITTED TO GAAFAR IBN OAF PAEDIATRIC HOSPITAL, KHARTOUM, SUDAN
- Study of CFG and System calls for Computer Virus Detection
- RESEARCH OF CORROSION RESISTANCE OF CHROME BASED NANO-COMPOSITION ELECTROLYTIC COATINGS
- Fuzzy Logic for Computer Virus Detection
- ANALYTICAL POTENTIALS OF DYE EXTRACTS FROM ASPILIA AFRICANA (ORAMEJULA) FLOWERS
Last modified: 2014-08-15 14:34:17