A Study on Instruction Substitution Analysis of Metamorphic Malware

作者: Kyoung-Soo Han , Kyoung-Yong Chung , Eul Gyu Im

DOI: 10.1007/978-94-007-2911-7_57

关键词:

摘要: Recent malware authors generate lots of variants using toolkits. Also, the has been generated various techniques for avoiding detection by anti-virus software. In particular, metamorphic avoids such in software modifying codes automatically including a engine as is propagated. this paper, an analysis instruction substitution performed and rule presented.

参考文章(4)
Qinghua Zhang, Douglas S. Reeves, MetaAware: Identifying Metamorphic Malware annual computer security applications conference. pp. 411- 420 ,(2007) , 10.1109/ACSAC.2007.9
Ran Jin, Pei Yang, Qiang Wei, Qingxian Wang, Normalization towards Instruction Substitution Metamorphism Based on Standard Instruction Set computational intelligence and security. pp. 795- 798 ,(2007) , 10.1109/CIS.WORKSHOPS.2007.215
Kyoung-Soo Han, Kyoung-Yong Chung, Eul Gyu Im, A Study on Instruction Substitution Analysis of Metamorphic Malware Lecture Notes in Electrical Engineering. pp. 595- 599 ,(2012) , 10.1007/978-94-007-2911-7_57