Generating Antivirus Evasive Executables Using Code Mutation
نویسندگان
چکیده
منابع مشابه
Using Fuzzy Pattern Recognition to Detect Unknown Malicious Executables Code
An intelligent detect system to recognition unknown computer virus is proposed. Using the method based on fuzzy pattern recognition algorithm, a malicious executable code detection network model is designed also. This model target at Win32 binary viruses on Intel IA32 architectures. It could detect known and unknown malicious code by analyzing their behavior. We gathered 423 benign and 209 mali...
متن کاملSteganography for Executables and Code Transformation Signatures
Steganography embeds a secret message in an innocuous cover-object. This paper identifies three cover-specific redundancies of executable programs and presents steganographic techniques to exploit these redundancies. A general framework to evaluate the stealth of the proposed techniques is introduced and applied on an implementation for the IA-32 architecture. This evaluation proves that, where...
متن کاملGenerating DNA Code Words Using Forbidding and Enforcing Systems
Research in DNA computing was initiated by Leonard Adleman in 1994 when he solved an instance of an NP-complete problem solely by molecules. DNA code words arose in the attempt to avoid unwanted hybridizations of DNA strands for DNA based computations. Given a set of constraints, generating a large set of DNA strands that satisfy the constraints is an important problem in DNA computing. On the ...
متن کاملGenerating Code Summaries Using the Power of the Crowd
One of the first steps to perform most of the software maintenance activities, such as updating features or fixing bugs, is to have a relatively good understanding of the program’s source code which is often written by other developers. A code summary is a description about a program’s entities (e.g., its methods) which helps developers have a better comprehension of the code in a shorter perio...
متن کاملGenerating Gapped Code Clone Information using Graph Mining Algorithm
At present, various kinds of code clone detection techniques have veen proposed. However, most of them cannot detect gapped code clones, which are ones that includes non-duplicated segments to its correspondant code clones. In this paper, we propose a method generating gapped code clone information from a detection result of existing code clone detection tools. The method adopts AGM (Apriori-ba...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Informatica Economica
سال: 2018
ISSN: 1453-1305,1842-8088
DOI: 10.12948/issn14531305/22.2.2018.08