Systems in Danger: A Short Review on Metamorphic Computer Viruses
Proceeding: The Third International Conference on Digital Security and Forensics (DigitalSec2016)Publication Date: 2016-09-06
Authors : Seyed Amirhossein Mousavi; Babak Bashari Rad; Teh Ying Wah;
Page : 20-26
Keywords : Malware; Compute Virus; Metamorphic virus; Polymorphic Virus; Obfuscation;
Abstract
In current times, anti-virus scanners are usually built on signatures which look for known patterns in order to decide if a file is virus infected. Hackers have incorporated the code obfuscation methods to generate highly metamorphic system malware in order to evade detection of signature based scanners. The scanners which are signature based may not be able to detect all existence of such viruses. Since, the metamorphic malware changes their appearance from one generation to another. Metamorphic malware is one of the many techniques that hackers use to attack systems. This paper explores the common types of computer malwares and metamorphic computer viruses while reviewing the different techniques of metamorphic malwares which are able to avoid detection.
Other Latest Articles
- Utilizing Program's Execution Data for Digital Forensics
- An Evidence Collection and Analysis of Ubuntu File System
- The Study of Automobile-Used Voice-Activity Detection System Based on Two-Dimensional Long-Time and Short-Frequency Spectral Entropy
- Automatic Car Park Management System Using Face and Vehicle Registration Recognition
- Influence of Temperature on Flow Electrification Characteristics of Oil-Pressboard Insulation
Last modified: 2016-09-11 23:54:01