A study on instruction substitution analysis of metamorphic malware

0Citations
Citations of this article
6Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Recent malware authors generate lots of malware variants using malware toolkits. Also, the malware has been generated using various techniques for avoiding detection by anti-virus software. In particular, metamorphic malware avoids such detection in anti-virus software by modifying codes automatically including a metamorphic engine as such malware is propagated. In this paper, an analysis of instruction substitution for metamorphic malware is performed and an instruction substitution rule is presented.

Cite

CITATION STYLE

APA

Han, K. S., Chung, K. Y., & Im, E. G. (2012). A study on instruction substitution analysis of metamorphic malware. In Lecture Notes in Electrical Engineering (Vol. 120 LNEE, pp. 595–599). https://doi.org/10.1007/978-94-007-2911-7_57

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free