Recent malware authors generate lots of malware variants using malware toolkits. Also, the malware has been generated using various techniques for avoiding detection by anti-virus software. In particular, metamorphic malware avoids such detection in anti-virus software by modifying codes automatically including a metamorphic engine as such malware is propagated. In this paper, an analysis of instruction substitution for metamorphic malware is performed and an instruction substitution rule is presented.
CITATION STYLE
Han, K. S., Chung, K. Y., & Im, E. G. (2012). A study on instruction substitution analysis of metamorphic malware. In Lecture Notes in Electrical Engineering (Vol. 120 LNEE, pp. 595–599). https://doi.org/10.1007/978-94-007-2911-7_57
Mendeley helps you to discover research relevant for your work.