Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

A study on instruction substitution analysis of metamorphic malware

Full metadata record
DC Field Value Language
dc.contributor.authorHan, Kyoung-Soo-
dc.contributor.authorChung, Kyoung-Yong-
dc.contributor.authorIm, Eul Gyu-
dc.date.accessioned2022-07-16T17:56:00Z-
dc.date.available2022-07-16T17:56:00Z-
dc.date.created2021-05-11-
dc.date.issued2011-12-
dc.identifier.issn1876-1100-
dc.identifier.urihttps://scholarworks.bwise.kr/hanyang/handle/2021.sw.hanyang/167008-
dc.description.abstractRecent malware authors generate lots of malware variants using malware toolkits. Also, the malware has been generated using various techniques for avoiding detection by anti-virus software. In particular, metamorphic malware avoids such detection in anti-virus software by modifying codes automatically including a metamorphic engine as such malware is propagated. In this paper, an analysis of instruction substitution for metamorphic malware is performed and an instruction substitution rule is presented.-
dc.language영어-
dc.language.isoen-
dc.publisherSpringer Verlag-
dc.titleA study on instruction substitution analysis of metamorphic malware-
dc.typeArticle-
dc.contributor.affiliatedAuthorIm, Eul Gyu-
dc.identifier.doi10.1007/978-94-007-2911-7_57-
dc.identifier.scopusid2-s2.0-84255161865-
dc.identifier.bibliographicCitationLecture Notes in Electrical Engineering, v.120 LNEE, pp.595 - 599-
dc.relation.isPartOfLecture Notes in Electrical Engineering-
dc.citation.titleLecture Notes in Electrical Engineering-
dc.citation.volume120 LNEE-
dc.citation.startPage595-
dc.citation.endPage599-
dc.type.rimsART-
dc.type.docTypeConference Paper-
dc.description.journalClass1-
dc.description.isOpenAccessN-
dc.description.journalRegisteredClassscopus-
dc.subject.keywordPlusAntivirus softwares-
dc.subject.keywordPlusMalware analysis-
dc.subject.keywordPlusMalwares-
dc.subject.keywordPlusMetamorphic malware-
dc.subject.keywordPlusComputer system firewalls-
dc.subject.keywordPlusComputer viruses-
dc.subject.keywordAuthorInstruction substitution-
dc.subject.keywordAuthorMalware analysis-
dc.subject.keywordAuthorMetamorphic malware-
dc.identifier.urlhttps://link.springer.com/chapter/10.1007/978-94-007-2911-7_57-
Files in This Item
Go to Link
Appears in
Collections
서울 공과대학 > 서울 컴퓨터소프트웨어학부 > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Im, Eul Gyu photo

Im, Eul Gyu
COLLEGE OF ENGINEERING (SCHOOL OF COMPUTER SCIENCE)
Read more

Altmetrics

Total Views & Downloads

BROWSE