ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

Systems in Danger: A Short Review on Metamorphic Computer Viruses

Proceeding: The Third International Conference on Digital Security and Forensics (DigitalSec2016)

Publication Date:

Authors : ; ; ;

Page : 20-26

Keywords : Malware; Compute Virus; Metamorphic virus; Polymorphic Virus; Obfuscation;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

In current times, anti-virus scanners are usually built on signatures which look for known patterns in order to decide if a file is virus infected. Hackers have incorporated the code obfuscation methods to generate highly metamorphic system malware in order to evade detection of signature based scanners. The scanners which are signature based may not be able to detect all existence of such viruses. Since, the metamorphic malware changes their appearance from one generation to another. Metamorphic malware is one of the many techniques that hackers use to attack systems. This paper explores the common types of computer malwares and metamorphic computer viruses while reviewing the different techniques of metamorphic malwares which are able to avoid detection.

Last modified: 2016-09-11 23:54:01