Models of levels of polymorphic viruses
Keywords:
поліморфізм, розшифровувач, інфікована програма, шкідлива програмаAbstract
Classification of polymorphic viruses is considered and complemented in the paper. On the basis of this classification the models of functioning of polymorphic viruses are described.
References
1. Szor P. Hunting for Metamorphic / P. Szor, P. Ferrie// Virus Bulletin. — Sept, 2001. — P. 123—144.
2. Christodorescu M. Static Analysis of Executables to Detect Malicious Patterns / M. Christodorescu, S. Jha // 12th conferenceon
USENIX Security Symposium, Aug., 2003, Berkeley, USA, 2003. — P. 169—186.
3. Christodorescu M. Semantics-Aware Malware Detection / M. Christodorescu, S. Jha, S. A. Seshia, D. Song, Bryant,
R. E. // Proceedings of the 2005 IEEE Symposium on Security and Privacy, 2005. Washington, DC, USA. — 2005. — P. 32—46.
4. Kruegel C. Detecting Kernel-Level Rootkits Through Binary Analysis / C. Kruegel, W. Robertson, G. Vigna // Proceedings
of the 20th Annual Computer Security Applications Conference, 2004, Washington, DC, USA. — 2004. — P. 91—100.
5. Bayer U. TTAnalyze : A Tool for Analyzing Malware / U. Bayer, C. Kruegel, E. Kirda // 15th European Institute for
Computer Antivirus Research (EICAR 2006) Annual Conference, Wien. — 2006.
6. Касперский Е. В. Компьютерные вирусы: что это такое и как с ними бороться / E. В. Касперский. — М. : СК
Пресс, 1998. — 288 с.
2. Christodorescu M. Static Analysis of Executables to Detect Malicious Patterns / M. Christodorescu, S. Jha // 12th conferenceon
USENIX Security Symposium, Aug., 2003, Berkeley, USA, 2003. — P. 169—186.
3. Christodorescu M. Semantics-Aware Malware Detection / M. Christodorescu, S. Jha, S. A. Seshia, D. Song, Bryant,
R. E. // Proceedings of the 2005 IEEE Symposium on Security and Privacy, 2005. Washington, DC, USA. — 2005. — P. 32—46.
4. Kruegel C. Detecting Kernel-Level Rootkits Through Binary Analysis / C. Kruegel, W. Robertson, G. Vigna // Proceedings
of the 20th Annual Computer Security Applications Conference, 2004, Washington, DC, USA. — 2004. — P. 91—100.
5. Bayer U. TTAnalyze : A Tool for Analyzing Malware / U. Bayer, C. Kruegel, E. Kirda // 15th European Institute for
Computer Antivirus Research (EICAR 2006) Annual Conference, Wien. — 2006.
6. Касперский Е. В. Компьютерные вирусы: что это такое и как с ними бороться / E. В. Касперский. — М. : СК
Пресс, 1998. — 288 с.
Downloads
-
PDF (Українська)
Downloads: 248
Abstract views: 123
Published
2015-03-26
How to Cite
[1]
O. S. Savenko, S. M. Lysenko, and A. O. Nicheporuk, “Models of levels of polymorphic viruses”, Вісник ВПІ, no. 2, pp. 75–83, Mar. 2015.
Issue
Section
Information technologies and computer sciences
License
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).