Evolution and Detection of Polymorphic and Metamorphic Malwares: A Survey
AI-generated Key Points
⚠The license of the paper does not allow us to build upon its content and the key points are generated using the paper metadata rather than the full article.
- Malwares are a significant threat in the digital world that constantly evolves with high complexity
- Malicious software programs can penetrate networks, steal confidential information, bring down servers, and cripple infrastructures
- Anti-malware software has been developed to combat these threats and attacks from malwares
- Existing anti-malware software is mostly based on the assumption that malware structure does not change appreciably, which has been challenged by recent advancements in second-generation malwares that can create variants
- Ashu Sharma and S.K. Sahay conducted a survey on malwares and its detection techniques to address this challenge of detecting second-generation malwares with low false alarms
- The authors present an overview of polymorphic and metamorphic malwares - two types of second-generation malwares that are particularly challenging to detect
- Various techniques for detecting these types of malwares are discussed including signature-based detection, behavior-based detection, heuristics-based detection, sandboxing techniques, machine learning-based detection methods, and hybrid approaches
- Limitations of each technique are highlighted and future research directions for improving malware detection accuracy while minimizing false positives are suggested
- This survey provides valuable insights into the evolution of malwares and the challenges associated with detecting them
- There is a need for more sophisticated anti-malware solutions that can keep up with the ever-evolving threat landscape in the digital world.
Authors: Ashu Sharma, S. K. Sahay
Abstract: Malwares are big threat to digital world and evolving with high complexity. It can penetrate networks, steal confidential information from computers, bring down servers and can cripple infrastructures etc. To combat the threat/attacks from the malwares, anti- malwares have been developed. The existing anti-malwares are mostly based on the assumption that the malware structure does not changes appreciably. But the recent advancement in second generation malwares can create variants and hence posed a challenge to anti-malwares developers. To combat the threat/attacks from the second generation malwares with low false alarm we present our survey on malwares and its detection techniques.
Ask questions about this paper to our AI assistant
You can also chat with multiple papers at once here.
⚠The license of the paper does not allow us to build upon its content and the AI assistant only knows about the paper metadata rather than the full article.
Welcome to our AI assistant! Here are some important things to keep in mind:
- The assistant will only answer questions related to this specific paper.
- Please note that this is not a bot for casual chatting.
- If you want the answer in a language other than the language you chose for navigating the website, simply add "TRANSLATE IN LANGUAGE L" at the end of your query (replace "LANGUAGE L" with the language of your choice).
- For example, you could ask "Can you extract the most important aspect of the paper? TRANSLATE IN SPANISH".
- If you want to keep the history of your questions/answers you should create an account.
Assess the quality of the AI-generated content by voting
Why do we need votes?
Votes are used to determine whether we need to re-run our summarizing tools. If the count reaches -10, our tools can be restarted.
Similar papers summarized with our AI tools
Navigate through even more similar papers through atree representation
Look for similar papers (in beta version)
By clicking on the button above, our algorithm will scan all papers in our database to find the closest based on the contents of the full papers and not just on metadata. Please note that it only works for papers that we have generated summaries for and you can rerun it from time to time to get a more accurate result while our database grows.
Disclaimer: The AI-based summarization tool and virtual assistant provided on this website may not always provide accurate and complete summaries or responses. We encourage you to carefully review and evaluate the generated content to ensure its quality and relevance to your needs.