Abstract
Malicious code designed to destroy or steal information from victimâs computer intentionally is known as malware. Signature-based detection is used to detect malware in antiviruses, but malware writers are using encryption and obfuscation to deter these detections. Techniques used to evade detection are broadly classified as polymorphism and metamorphism. Polymorphic malwares encrypt virus payload and decryption engine with different encryption keys, but virus payload remains the same. Metamorphic malware uses code obfuscation techniques, which regenerate distinct variant of same malware family. Detection of metamorphic malware is a challenging task, in the presence of code obfuscation. This paper gives an overview on different metamorphic malware detection techniques and analyzes their strengths and weaknesses.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.