Detection of metamorphic viruses: A survey

Computer viruses are big problem for security. It is essential to differentiate between reproducing programs and its similar forms. Reproducing programs will not necessarily harm the system. Classification aspect of metamorphic viruses is an emerging issue of research. The orientation and expansion of metamorphic viruses is quite critical and general problem of finding metamorphic viruses is NP hard. In this paper emerging methodology are discussed with their efficiency and working pattern.

[1]  Mark Stamp,et al.  Chi-squared distance and metamorphic virus detection , 2013, Journal of Computer Virology and Hacking Techniques.

[2]  Peter Ferrie Attacks on Virtual Machine Emulators , 2007 .

[3]  Catalin Boja,et al.  Optimization of Antivirus Software , 2007 .

[4]  Sami Khuri,et al.  ANALYSIS AND DETECTION OF METAMORPHIC COMPUTER VIRUSES , 2006 .

[5]  Corporate,et al.  The handbook of information security , 1991 .

[6]  Somesh Jha,et al.  Static Analysis of Executables to Detect Malicious Patterns , 2003, USENIX Security Symposium.

[7]  Peter Szor,et al.  The Art of Computer Virus Research and Defense , 2005 .

[8]  José Meseguer,et al.  The Rewriting Logic Semantics Project , 2006, SOS@ICALP.

[9]  Mattia Monga,et al.  Detecting Self-mutating Malware Using Control-Flow Graph Matching , 2006, DIMVA.

[11]  Sjsu ScholarWorks,et al.  Metamorphic Detection via Emulation , 2014 .

[12]  Grant Malcolm,et al.  Detection of metamorphic computer viruses using algebraic specification , 2006, Journal in Computer Virology.

[13]  Arun Lakhotia,et al.  Imposing order on program statements to assist anti-virus scanners , 2004, 11th Working Conference on Reverse Engineering.

[14]  A. Kohn [Computer viruses]. , 1989, Harefuah.

[15]  Philippe Beaucamps Advanced Polymorphic Techniques , 2007 .

[16]  Christian Callegari,et al.  Advances in Computing, Communications and Informatics (ICACCI) , 2015 .

[17]  John Aycock,et al.  Computer Viruses and Malware , 2006, Advances in Information Security.