Malicious Code Analysis using Metalanguage

Abstract

 Computer viruses are big threat to computer world; researchers doing work in this area have made various efforts in the direction of classification and detection methods of these viruses. Graph mining, system call arrangement and graphical analysis are some latest research activities in this field. The computability theory and the semi computable computable functions are quite important in our context of analyzing malicious activity. A mathematical model like random access stored program machine with the association attached background is used by Ferenc Leitold while explaining modeling of viruses in his paper. Computer viruses like polymorphic viruses and metamorphic viruses are using more efficient techniques for their evolution so it is required to use strong models to understand their evolution and then apply detection followed by the process of removal. Code Emulation is one of the strongest ways to analyze computer viruses but the anti-emulation activities made by virus designers are also active. Metalanguage and metaprogramming are used to analyze the malicious codes

Authors and Affiliations

Ankur Singh Bist

Keywords

Related Articles

 Secured and Verifiable Approach for Attribute Based Encryption in Cloud Computing

 Cloud Computing has changed the phenomena of IT industry completely. It allows access to highly scalable, inexpensive, on demand computing resources that can execute the code and store data that are provided. But...

 A Survey on Target Tracking Techniques in Wireless Sensor Network

 Wireless Sensor technology is rapidly spreading all around the world. One important use of sensor networks is the tracking of a mobile target (point source) by the network.Mobile target tracking in wireless sensor...

 UNDER DISTORTED GRID VOLTAGE DIRECT POWER CONTROL OF DOUBLY FED INDUCTION GENERATOR

 This paper presents a direct power control strategy for a doubly fed induction generator based wind power By analyzing the six times grid frequency power pulsation produced by the fifth and seventh grid voltag...

 Silicone Hose with Braiding Technology

 Silicone Rubber is a specialty synthetic elastomer that provides a unique balance of chemical and mechanical properties required by many of today's more demanding industrial applicatio purity and chemical makeup,...

 Human Identification Based On Scleral Vasculature

 The blood vessel patterns of sclera show rich and unique details. To date, sclera is relatively less studied and little is known regarding its usefulness and performance. Here, sclera recognition for human identif...

Download PDF file
  • EP ID EP158884
  • DOI -
  • Views 67
  • Downloads 0

How To Cite

Ankur Singh Bist (30).  Malicious Code Analysis using Metalanguage. International Journal of Engineering Sciences & Research Technology, 3(1), 192-194. https://europub.co.uk/articles/-A-158884