Generating Antivirus Evasive Executables Using Code Mutation

نویسندگان

چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Using Fuzzy Pattern Recognition to Detect Unknown Malicious Executables Code

An intelligent detect system to recognition unknown computer virus is proposed. Using the method based on fuzzy pattern recognition algorithm, a malicious executable code detection network model is designed also. This model target at Win32 binary viruses on Intel IA32 architectures. It could detect known and unknown malicious code by analyzing their behavior. We gathered 423 benign and 209 mali...

متن کامل

Steganography for Executables and Code Transformation Signatures

Steganography embeds a secret message in an innocuous cover-object. This paper identifies three cover-specific redundancies of executable programs and presents steganographic techniques to exploit these redundancies. A general framework to evaluate the stealth of the proposed techniques is introduced and applied on an implementation for the IA-32 architecture. This evaluation proves that, where...

متن کامل

Generating DNA Code Words Using Forbidding and Enforcing Systems

Research in DNA computing was initiated by Leonard Adleman in 1994 when he solved an instance of an NP-complete problem solely by molecules. DNA code words arose in the attempt to avoid unwanted hybridizations of DNA strands for DNA based computations. Given a set of constraints, generating a large set of DNA strands that satisfy the constraints is an important problem in DNA computing. On the ...

متن کامل

Generating Code Summaries Using the Power of the Crowd

One of the first steps to perform most of the software maintenance activities, such as updating features or fixing bugs, is to have a relatively good understanding of the program’s source code which is often written by other developers. A code summary is a description about a program’s entities (e.g., its methods) which helps developers have a better comprehension of the code in a shorter perio...

متن کامل

Generating Gapped Code Clone Information using Graph Mining Algorithm

At present, various kinds of code clone detection techniques have veen proposed. However, most of them cannot detect gapped code clones, which are ones that includes non-duplicated segments to its correspondant code clones. In this paper, we propose a method generating gapped code clone information from a detection result of existing code clone detection tools. The method adopts AGM (Apriori-ba...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Informatica Economica

سال: 2018

ISSN: 1453-1305,1842-8088

DOI: 10.12948/issn14531305/22.2.2018.08