Evolution and Detection of Polymorphic and Metamorphic Malwares: A Survey

AI-generated keywords: Malware Detection Polymorphic Metamorphic Variants

AI-generated Key Points

The license of the paper does not allow us to build upon its content and the key points are generated using the paper metadata rather than the full article.

  • Malwares are a significant threat in the digital world that constantly evolves with high complexity
  • Malicious software programs can penetrate networks, steal confidential information, bring down servers, and cripple infrastructures
  • Anti-malware software has been developed to combat these threats and attacks from malwares
  • Existing anti-malware software is mostly based on the assumption that malware structure does not change appreciably, which has been challenged by recent advancements in second-generation malwares that can create variants
  • Ashu Sharma and S.K. Sahay conducted a survey on malwares and its detection techniques to address this challenge of detecting second-generation malwares with low false alarms
  • The authors present an overview of polymorphic and metamorphic malwares - two types of second-generation malwares that are particularly challenging to detect
  • Various techniques for detecting these types of malwares are discussed including signature-based detection, behavior-based detection, heuristics-based detection, sandboxing techniques, machine learning-based detection methods, and hybrid approaches
  • Limitations of each technique are highlighted and future research directions for improving malware detection accuracy while minimizing false positives are suggested
  • This survey provides valuable insights into the evolution of malwares and the challenges associated with detecting them
  • There is a need for more sophisticated anti-malware solutions that can keep up with the ever-evolving threat landscape in the digital world.
Also access our AI generated: Comprehensive summary, Lay summary, Blog-like article; or ask questions about this paper to our AI assistant.

Authors: Ashu Sharma, S. K. Sahay

International Journal of Computer Applications, 2014, Vol. 90, No. 2, p. 7
5 Pages

Abstract: Malwares are big threat to digital world and evolving with high complexity. It can penetrate networks, steal confidential information from computers, bring down servers and can cripple infrastructures etc. To combat the threat/attacks from the malwares, anti- malwares have been developed. The existing anti-malwares are mostly based on the assumption that the malware structure does not changes appreciably. But the recent advancement in second generation malwares can create variants and hence posed a challenge to anti-malwares developers. To combat the threat/attacks from the second generation malwares with low false alarm we present our survey on malwares and its detection techniques.

Submitted to arXiv on 27 Jun. 2014

Ask questions about this paper to our AI assistant

You can also chat with multiple papers at once here.

The license of the paper does not allow us to build upon its content and the AI assistant only knows about the paper metadata rather than the full article.

AI assistant instructions?

Results of the summarizing process for the arXiv paper: 1406.7061v2

This paper's license doesn't allow us to build upon its content and the summarizing process is here made with the paper's metadata rather than the article.

In the digital world, malwares are a significant threat that is constantly evolving with high complexity. These malicious software programs can penetrate networks, steal confidential information from computers, bring down servers, and cripple infrastructures. To combat these threats and attacks from malwares, anti-malware software has been developed. However, the existing anti-malware software is mostly based on the assumption that the malware structure does not change appreciably. This assumption has been challenged by recent advancements in second-generation malwares that can create variants and pose a challenge to anti-malware developers. To address this challenge of detecting second-generation malwares with low false alarms, Ashu Sharma and S.K. Sahay have conducted a survey on malwares and its detection techniques. In their paper titled "Evolution and Detection of Polymorphic and Metamorphic Malwares: A Survey," they present an overview of polymorphic and metamorphic malwares - two types of second-generation malwares that are particularly challenging to detect. The authors discuss various techniques for detecting these types of malwares, including signature-based detection, behavior-based detection, heuristics-based detection, sandboxing techniques, machine learning-based detection methods, and hybrid approaches. They also highlight the limitations of each technique and suggest future research directions for improving malware detection accuracy while minimizing false positives. Overall, this survey provides valuable insights into the evolution of malwares and the challenges associated with detecting them. It highlights the need for more sophisticated anti-malware solutions that can keep up with the ever-evolving threat landscape in the digital world.
Created on 13 Jun. 2023

Assess the quality of the AI-generated content by voting

Score: 0

Why do we need votes?

Votes are used to determine whether we need to re-run our summarizing tools. If the count reaches -10, our tools can be restarted.

The previous summary was created more than a year ago and can be re-run (if necessary) by clicking on the Run button below.

The license of this specific paper does not allow us to build upon its content and the summarizing tools will be run using the paper metadata rather than the full article. However, it still does a good job, and you can also try our tools on papers with more open licenses.

Similar papers summarized with our AI tools

Navigate through even more similar papers through a

tree representation

Look for similar papers (in beta version)

By clicking on the button above, our algorithm will scan all papers in our database to find the closest based on the contents of the full papers and not just on metadata. Please note that it only works for papers that we have generated summaries for and you can rerun it from time to time to get a more accurate result while our database grows.

Disclaimer: The AI-based summarization tool and virtual assistant provided on this website may not always provide accurate and complete summaries or responses. We encourage you to carefully review and evaluate the generated content to ensure its quality and relevance to your needs.