Assembly Language Analysis for Identification of Malicious Codes

Abstract

  in the direction of classification and detection of these viruses. Gr some latest research activities in this field. The computability theory and the semi computable computable functions are quite important in our context of analyzing malicious activity. A mathematical model like rando program machine with the association of attached background is used by Ferenc Leitold while explaining modeling of viruses in his paper. Computer viruses like polymorphic viruses and metamorphic viruses have more efficient techniques for their evolution so it is required to use strong models to understand their evolution and then apply detection followed by the process of removal. Cod

Authors and Affiliations

Ankur Singh Bist

Keywords

Related Articles

UNDERGROUND CABLE FAULT DISTANCE LOCATOR BY USING MICROCONTROLLER

This paper conclude that the underground cable fault location model by using microcontroller. The purpose of project is to identify the cable fault distance from initial position in terms of kilometer. By using simple m...

 CLASSIFICATION OF EEG SIGNAL DATA USING HYBRID OF NEURO-FUZZY

 Brain Computing interface technology represents a very highly growing field now-a-days for the research because of its unique applications system. In this paper we investigate classification methods of mental comm...

DIFFERENT METHODS FOR DG ANTI-ISLANDING PROTECTION

For better power quality and reliability, the power industry are focusing to distributed generations i.e. DG. New technology like photo voltaic (PV), fuel cell, wind turbine, and new innovation in power electronics gene...

 Microcontroller Based Weather Data Logger

 Data logger periodically measures various real-time meteorological parameters and stores for future use. The Microcontroller based automatic weather Data Logger is arranged that it can automatically operate unatte...

 IMPLEMENTATION AND DESIGN THREE SOFTWARE USING REUSABLE SOFTWARE CONCEPT “ANALYTICAL STUDY”

 There are two ways for the principle of re-use software and the first way is the indirect method indirect boils down to the use of one or more pieces of software in the production and creation of new programs witho...

Download PDF file
  • EP ID EP148559
  • DOI -
  • Views 68
  • Downloads 0

How To Cite

Ankur Singh Bist (30).  Assembly Language Analysis for Identification of Malicious Codes. International Journal of Engineering Sciences & Research Technology, 3(1), 195-196. https://europub.co.uk/articles/-A-148559