Computer Science ›› 2008, Vol. 35 ›› Issue (2): 89-92.

Previous Articles     Next Articles

JIN Ran, WEI Qiang ,WAN Qing-Xian (Information Engineering Institute, Information Engineering University, Zhengzhou 450002)   

  • Online:2018-11-16 Published:2018-11-16

Abstract: Much of apparently new malware comes from transformed known malware. Metamorphic malware could even complete this process automatically. The mutable signature makes the traditional detection method based on it difficult to detect metamorphic malware. Comb

Key words: Metamorphic malware, Normalization, Malware detection

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!