Spyware Detection Techniques

Abstract

 Computer viruses are big threat to computer world; researchers doing work in this area have made various efforts in the direction of classification and detection methods of these viruses. Graph mining, system call arrangement and CFG analysis are some latest research activities in this field. The computability theory and the semi computable functions are quite important in our context of analyzing malicious activities. A mathematical model like random access stored program machine with the association of attached background is used by Ferenc Leitold while explaining modeling of viruses in his paper. Computer viruses like polymorphic viruses and metamorphic viruses use more efficient techniques for their evolution so it is required to use strong models for understanding their evolution and then apply detection followed by the process of removal. Code Emulation is one of the strongest ways to analyze computer viruses but the anti-emulation activities made by virus designers are also active. This paper involves the study of spywares.

Authors and Affiliations

Ankur Singh Bist

Keywords

Related Articles

 SECRET DATA HIDING IN ENCRYPTED COMPRESSED VIDEO BITSTREAMS USING CHAOS CRYPTO SYSTEM

 Early research works have been done on image. Due to few features of images, such as high correlation among pixels and bulk data capacity , previous encryption algorithms are not suitable. Cloud computing has beco...

 ANALYSIS OF REINFORCE CONCRETE BUILDING USING DIFFERENT BRACING SYSTEM UNDER EARTHQUAKE LOADING

 In this study, seismic analysis of multi storey RC building frames have been carried out considering different types of bracing systems. Bracing systems are very efficient in resisting lateral forces. STAAD.Pro so...

A REVIEW ON OBJECT REMOVAL USING EXAMPLER BASED IMAGE IMPAINTING TECHNIQUE

Image inpainting was historically done manually by painters for removing defect from paintings and photographs. Fill the region of missing information from a signal using surrounding information and re - form signa...

INFRASTRUCTURE MANAGEMENT OF CITIES THROUGH AUTOMATION

Exponential expansion of cities posses’ significant challenges in Infrastructure. Hence Management of Infrastructure in conventional ways are time consuming, wastage of resources, consuming manpower, costlier and can r...

PV based Dynamic Voltage Restorer with Minimal Energy Control Using Fuzzy

A novel PV based Dynamic voltage restorer (DVR) with fuzzy controller installed between the supply and sensitive load to protect sensitive devices in voltage disturbances. DVR should inject voltage and active power from...

Download PDF file
  • EP ID EP122511
  • DOI -
  • Views 67
  • Downloads 0

How To Cite

Ankur Singh Bist (30).  Spyware Detection Techniques. International Journal of Engineering Sciences & Research Technology, 3(2), 780-782. https://europub.co.uk/articles/-A-122511