Similarity Test for Metamorphic Viruses Computer Science Essay




Current hot topics in computer science. The ethical implications of facial recognition technology. The role of blockchain in data security and privacy. The future of quantum computing and its possibilities. Commercial antivirus scanners are generally signature based, that is, they scan for known patterns to determine if a file is infected. To evade signature-based detection, virus writers have used code obfuscation techniques to create metamorphic viruses. Metamorphic viruses change their internal structure. In this paper, we consider a method for computing executable similarity based on opcode graphs. We apply this technique to the challenging problem of metamorphic malware detection and compare the results with previous work based on obfuscation. Limitations of signature-based detection for detecting metamorphic viruses are presented and a similarity measurement method has been successfully applied in the field of document classification problems to apply similarity measurement methods to static features, API calls of executable files to classify it as malware or benign. To expand





Please wait while your request is being verified...



58952450
39008609
4645430
104025555
59162040