Detection of Logic Bombs
Journal Title: International Journal of Engineering Sciences & Research Technology - Year 30, Vol 3, Issue 2
Abstract
Computer viruses are big threat to computer world; researchers doing work in this area have made various efforts in the direction of classification and detection methods of these viruses. Graph mining, system call arrangement and CFG analysis are some latest research activities in this field. The computability theory and the semi computable functions are quite important in our context of analyzing malicious activities. A mathematical model like random access stored program machine with the association of attached background is used by Ferenc Leitold while explaining modeling of viruses in his paper. Computer viruses like polymorphic viruses and metamorphic viruses use more efficient techniques for their evolution so it is required to use strong models for understanding their evolution and then apply detection followed by the process of removal. Code Emulation is one of the strongest ways to analyze computer viruses but the anti-emulation activities made by virus designers are also active. This paper involves the study of logic bombs.
Authors and Affiliations
Ankur Singh Bist
The Midrex Process and the Nigerian Steel Industry
The goal of producing steel in Nigeria from iron ore was made possible through the Midrex Process based Direct Reduction plant at the Delta Steel Company. The iron ore was originally imported from Liberia and its...
An Efficient Pricing Mechanism for Mobile Video Streaming in Cloud Computing
Among the most popular consumer devices, the mobile phones are the one whose usage has increased in a rapid manner and along with the development of 3G networks and smart phones, enabled users to use them in an e...
A Review on Adaptive Approach for Degraded Document Binarization
This paper deals with an adaptive approach for binarization and enhancement of degraded documents. considerate the text from badly degraded document image is very difficult job due to high variations between the...
Content Protection through Reversible Watermarking Technique
This paper proposes a steganalysis scheme for detecting reversible contrast mapping (RCM) watermarking. Lossless data hiding is a technique that used to embed secret message into media for generating the stego ima...
Influence of Nano Fillers in the Development of Glass Epoxy –Nano Alumina Hybrid Nano Composite
The research is carried out to develop a new polymer matrix hybrid Nano composite. The effect of alumina Nano particles between the glass fibre and epoxy resin was investigated. Well-dispersed Nano particles enhan...