Sciweavers

24 search results - page 1 / 5
» Normalizing Metamorphic Malware Using Term Rewriting
Sort
View
SCAM
2006
IEEE
13 years 12 months ago
Normalizing Metamorphic Malware Using Term Rewriting
Metamorphic malware — including certain viruses and worms — rewrite their code during propagation. This paper presents a method for normalizing multiple variants of metamorphi...
Andrew Walenstein, Rachit Mathur, Mohamed R. Chouc...
VIROLOGY
2008
121views more  VIROLOGY 2008»
13 years 5 months ago
Constructing malware normalizers using term rewriting
A malware mutation engine is able to transform a malicious program to create a different version of the program. Such mutation engines are used at distribution sites or in self-pro...
Andrew Walenstein, Rachit Mathur, Mohamed R. Chouc...
ICPR
2004
IEEE
14 years 7 months ago
Shape Metamorphism using p-Laplacian Equation
We present a new approach for shape metamorphism, which is a process of gradually changing a source shape (known) through intermediate shapes (unknown) into a target shape (known)...
Bahram Parvin, Ge Cong, George Bebis, Mehmet Esser
HOA
1993
13 years 10 months ago
Strong Normalization of Typeable Rewrite Systems
This paper studies termination properties of rewrite systems that are typeable using intersection types. It introduces a notion of partial type assignment on Curryfied Term Rewri...
Steffen van Bakel, Maribel Fernández
KDD
2009
ACM
173views Data Mining» more  KDD 2009»
13 years 10 months ago
Malware detection using statistical analysis of byte-level file content
Commercial anti-virus software are unable to provide protection against newly launched (a.k.a “zero-day”) malware. In this paper, we propose a novel malware detection techniqu...
S. Momina Tabish, M. Zubair Shafiq, Muddassar Faro...