Evolution of computer virus concealment and anti-virus techniques: a short survey

This paper presents a general overview on evolution of concealment methods in computer viruses and defensive techniques employed by anti -virus products. In order to stay far from the anti -virus scanners, computer viruses gradually improve their code s to make them invisible. On the other hand, ant...

Full description

Saved in:
Bibliographic Details
Main Authors: Rad, Babak Bashari, Masrom, Maslin, Ibrahim, Suhaimi
Format: Article
Published: International Journal of Computer Science Issues 2011
Subjects:
Online Access:http://eprints.utm.my/id/eprint/39941/
http://ijcsi.org/papers/IJCSI-8-1-113-121.pdf
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Universiti Teknologi Malaysia
id my.utm.39941
record_format eprints
spelling my.utm.399412019-03-17T04:21:24Z http://eprints.utm.my/id/eprint/39941/ Evolution of computer virus concealment and anti-virus techniques: a short survey Rad, Babak Bashari Masrom, Maslin Ibrahim, Suhaimi QA75 Electronic computers. Computer science This paper presents a general overview on evolution of concealment methods in computer viruses and defensive techniques employed by anti -virus products. In order to stay far from the anti -virus scanners, computer viruses gradually improve their code s to make them invisible. On the other hand, anti-virus technologies continually follow the virus tricks and methodologies to overcome their threats. In this process, anti-virus experts design and develop new methodologies to make them stronger, more and more, every day. The purpose of this paper is to review these methodologies and outline their strengths and weaknesses to encourage those are interested in more investigation on these areas. International Journal of Computer Science Issues 2011-01 Article PeerReviewed Rad, Babak Bashari and Masrom, Maslin and Ibrahim, Suhaimi (2011) Evolution of computer virus concealment and anti-virus techniques: a short survey. IJCSI International Journal of Computer Science Issues, 8 (1). pp. 113-121. ISSN 1694-0814 http://ijcsi.org/papers/IJCSI-8-1-113-121.pdf
institution Universiti Teknologi Malaysia
building UTM Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider Universiti Teknologi Malaysia
content_source UTM Institutional Repository
url_provider http://eprints.utm.my/
topic QA75 Electronic computers. Computer science
spellingShingle QA75 Electronic computers. Computer science
Rad, Babak Bashari
Masrom, Maslin
Ibrahim, Suhaimi
Evolution of computer virus concealment and anti-virus techniques: a short survey
description This paper presents a general overview on evolution of concealment methods in computer viruses and defensive techniques employed by anti -virus products. In order to stay far from the anti -virus scanners, computer viruses gradually improve their code s to make them invisible. On the other hand, anti-virus technologies continually follow the virus tricks and methodologies to overcome their threats. In this process, anti-virus experts design and develop new methodologies to make them stronger, more and more, every day. The purpose of this paper is to review these methodologies and outline their strengths and weaknesses to encourage those are interested in more investigation on these areas.
format Article
author Rad, Babak Bashari
Masrom, Maslin
Ibrahim, Suhaimi
author_facet Rad, Babak Bashari
Masrom, Maslin
Ibrahim, Suhaimi
author_sort Rad, Babak Bashari
title Evolution of computer virus concealment and anti-virus techniques: a short survey
title_short Evolution of computer virus concealment and anti-virus techniques: a short survey
title_full Evolution of computer virus concealment and anti-virus techniques: a short survey
title_fullStr Evolution of computer virus concealment and anti-virus techniques: a short survey
title_full_unstemmed Evolution of computer virus concealment and anti-virus techniques: a short survey
title_sort evolution of computer virus concealment and anti-virus techniques: a short survey
publisher International Journal of Computer Science Issues
publishDate 2011
url http://eprints.utm.my/id/eprint/39941/
http://ijcsi.org/papers/IJCSI-8-1-113-121.pdf
_version_ 1643650400398606336