Assembly Language Analysis for Identification of Malicious Codes

Abstract

  in the direction of classification and detection of these viruses. Gr some latest research activities in this field. The computability theory and the semi computable computable functions are quite important in our context of analyzing malicious activity. A mathematical model like rando program machine with the association of attached background is used by Ferenc Leitold while explaining modeling of viruses in his paper. Computer viruses like polymorphic viruses and metamorphic viruses have more efficient techniques for their evolution so it is required to use strong models to understand their evolution and then apply detection followed by the process of removal. Cod

Authors and Affiliations

Ankur Singh Bist

Keywords

Related Articles

 Wound Measurement using Digital Image Processing

 Wound healing is important issue to doctor for getting the exact treatment. The wound is quantified by the late of change of wounds surface area. The portable area based on segmental digital image. Wound area meas...

 UNDERSTANDING THE DIFFERENT VULNERABILITY METHODS OF ATTACKS IN SECURE DATA

 Cipher text-policy attribute based encryption (CPABE) provides an encrypted access control mechanism for broadcasting messages. Basically, a sender encrypts a message with an access control policy tree which is lo...

 A REVIEW OF COMPARATIVE EVALUATION OF THERMAL INSULATION MATERIALS FOR BUILDING WALL APPLICATIONS

 Attention towards the thermal performance of building materials, particularly thermal insulation systems for buildings, has grown in recent years. Thermal insulation of building walls has a significant effect on t...

MULTIFACTOR SEMANTIC RANKING FOR EFFICIENT MULTIPURPOSE PRODUCT LISTINGS

The product ranking models has been deployed to the various applications, where the larger volumes of the data entries is involved. The product ranking models includes the various factors for the ranking for the search l...

 E- Panchayat

 There are various models and solution available for E-Governance. However cost effective solution is always preferable. An electronic knowledge based system titled “e-Panchayat” with effective involvement of the...

Download PDF file
  • EP ID EP148559
  • DOI -
  • Views 77
  • Downloads 0

How To Cite

Ankur Singh Bist (30).  Assembly Language Analysis for Identification of Malicious Codes. International Journal of Engineering Sciences & Research Technology, 3(1), 195-196. https://europub.co.uk/articles/-A-148559