Skip to main content

Efficiency Improvement in Code Emulation by Soft Computing Technique

  • Conference paper
  • First Online:
Proceeding of the International Conference on Computer Networks, Big Data and IoT (ICCBI - 2018) (ICCBI 2018)

Part of the book series: Lecture Notes on Data Engineering and Communications Technologies ((LNDECT,volume 31))

Included in the following conference series:

  • 1751 Accesses

Abstract

Cyber espionage is an illicit way of obtaining secrets or information without user’s knowledge. Today, the Stuxnet, Duqu and flame computer worms which are used as cyber weapons against nations continue to make headlines as a new breed of malware. Understanding this topic is important to know how technology shapes the world and influences nation-state relation. It can be in different ways, malicious software like malware- a threat to system security. The technique of malware analysis either in sophistication of samples analyzed through the traditional approaches has its own con’s (Zero day Vulnerability). The aim of this paper is to analyze metamorphic virus using code emulation and implementation of few simple parameters by using fuzzy logic. We also justified how and why these parameters are considered. For a brief introduction to this paper, we used code emulator which creates a virtual environment where we considered number of iterations, memory access function and size of the virus as the performance metrics. The point of code emulation is to mimic the instruction set of CPU using virtual registers and flags.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Venkatesan, A: Code obfuscation and metamorphic virus detection. Master Thesis, Sanjose state university

    Google Scholar 

  2. Szor, P.: The Art of Computer Virus Research and Defense. Addison-Wesley, Boston (2005)

    Google Scholar 

  3. Sridharan, S.M.: Hunting for metamorphic engines

    Google Scholar 

  4. Wong, W.: Analysis and detection of metamorphic computer viruses

    Google Scholar 

  5. Bin, S.A., Sharif, M.D.: Metamorphic worm that carries its own morphing engine

    Google Scholar 

  6. Stamp, M., Lin, D.: Hunting for undetectable metamorphic viruses. Master Thesis, Department of Computer science, SJSU, spring 2010

    Google Scholar 

  7. Kalbhor, A.: A tiered approach to detect metamorphic malware with hidden markov models

    Google Scholar 

  8. Govindaraj, S.: Practical detection of metamorphic virus. Master Thesis, Sanjose state university

    Google Scholar 

  9. Pryala Shyry, S.: Performance measurement in selfish overlay network by fuzzy logic deployment of overlay nodes. In: International Conference on Control Instrumentation, Communication Technologies (IEEE Xplore), ICCICCT 2014, pp. 717–721 (2014)

    Google Scholar 

  10. Chandrasekharan, M., Muralidharan, M.: Application of soft computing techniques in machining performance prediction and optimization: a literature review. Int. J. Adv. Manuf. Technol. 46, 445–464 (2010)

    Article  Google Scholar 

  11. Choudhary, S.P.: A simple method for detection of metaphoric malware using dynamic analysis and text mining. Procedia Comput. Sci. 54, 265–270 (2015)

    Article  Google Scholar 

  12. Lo, C.T.D., Pablo, O.: Towards an effective and efficient malware detection system. In: International Conference on Big Data (IEEE Xplore)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to S. Prayla Shyry , M. Saranya or M. Mahithaa Sree .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Prayla Shyry, S., Saranya, M., Mahithaa Sree, M. (2020). Efficiency Improvement in Code Emulation by Soft Computing Technique. In: Pandian, A.P., Senjyu, T., Islam, S.M.S., Wang, H. (eds) Proceeding of the International Conference on Computer Networks, Big Data and IoT (ICCBI - 2018). ICCBI 2018. Lecture Notes on Data Engineering and Communications Technologies, vol 31. Springer, Cham. https://doi.org/10.1007/978-3-030-24643-3_7

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-24643-3_7

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-24642-6

  • Online ISBN: 978-3-030-24643-3

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics