Computer Science ›› 2008, Vol. 35 ›› Issue (2): 89-92.
Previous Articles Next Articles
JIN Ran, WEI Qiang ,WAN Qing-Xian (Information Engineering Institute, Information Engineering University, Zhengzhou 450002)
Online:
Published:
Abstract: Much of apparently new malware comes from transformed known malware. Metamorphic malware could even complete this process automatically. The mutable signature makes the traditional detection method based on it difficult to detect metamorphic malware. Comb
Key words: Metamorphic malware, Normalization, Malware detection
JIN Ran, WEI Qiang ,WAN Qing-Xian (Information Engineering Institute, Information Engineering University, Zhengzhou 450002). [J].Computer Science, 2008, 35(2): 89-92.
0 / / Recommend
Add to citation manager EndNote|Reference Manager|ProCite|BibTeX|RefWorks
URL: https://www.jsjkx.com/EN/
https://www.jsjkx.com/EN/Y2008/V35/I2/89
Cited