Opcodes histogram for classifying metamorphic portable executables malware
Malware writers attempt to generate different shapes of a malware to evade the signature-based scanners. As the number of variants of a metamorphic malware is increased, the analysis of all variants and selecting the appropriate signature and updating the database of the antivirus becomes more tires...
à®®à¯à®´à¯ விளகà¯à®•à®®à¯
Saved in:
| தலைமை எழà¯à®¤à¯à®¤à®¾à®³à®°à¯à®•ளà¯: | , |
|---|---|
| வடிவமà¯: | Conference or Workshop Item |
| வெளியீடபà¯à®ªà®Ÿà¯à®Ÿà®¤à¯: |
2012
|
| பகà¯à®¤à®¿à®•ளà¯: | |
| நிகழà¯à®¨à®¿à®²à¯ˆ அணà¯à®•லà¯: | http://eprints.utm.my/34159/ http://eprints.utm.my/34159/ |
| கà¯à®±à®¿à®¯à¯€à®Ÿà¯à®•ளà¯: |
கà¯à®±à®¿à®šà¯à®šà¯Šà®²à¯ இணை
கà¯à®±à®¿à®¯à¯€à®Ÿà¯à®•ள௠இலà¯à®²à¯ˆ, இநà¯à®¤ கà¯à®±à®¿à®šà¯à®šà¯Šà®²à¯à®²à¯ˆ à®®à¯à®¤à®²à®¿à®²à¯ பதிவ௠செயà¯à®¯à¯à®™à¯à®•ளà¯!
|
இநà¯à®¤ கரà¯à®¤à¯à®¤à¯ˆ à®®à¯à®¤à®²à®¿à®²à¯ விடà¯à®Ÿà¯à®šà¯à®šà¯†à®²à¯à®²à¯à®™à¯à®•ளà¯!