Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleNovember 2019
MetaHunt: Towards Taming Malware Mutation via Studying the Evolution of Metamorphic Virus
SPRO'19: Proceedings of the 3rd ACM Workshop on Software ProtectionPages 15–26https://doi.org/10.1145/3338503.3357720As the underground industry of malware prospers, malware developers consistently attempt to camouflage malicious code and undermine malware detection with various obfuscation schemes. Among them, metamorphism is known to have the potential to defeat the ...
- ArticleJuly 2010
Metamorphic virus variants classification using opcode frequency histogram
In order to prevent detection and evade signature-based scanning methods, which are normally exploited by antivirus softwares, metamorphic viruses use several various obfuscation approaches. They transform their code in new instances as look entirely or ...