Abstract
Cyber espionage is an illicit way of obtaining secrets or information without user’s knowledge. Today, the Stuxnet, Duqu and flame computer worms which are used as cyber weapons against nations continue to make headlines as a new breed of malware. Understanding this topic is important to know how technology shapes the world and influences nation-state relation. It can be in different ways, malicious software like malware- a threat to system security. The technique of malware analysis either in sophistication of samples analyzed through the traditional approaches has its own con’s (Zero day Vulnerability). The aim of this paper is to analyze metamorphic virus using code emulation and implementation of few simple parameters by using fuzzy logic. We also justified how and why these parameters are considered. For a brief introduction to this paper, we used code emulator which creates a virtual environment where we considered number of iterations, memory access function and size of the virus as the performance metrics. The point of code emulation is to mimic the instruction set of CPU using virtual registers and flags.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Venkatesan, A: Code obfuscation and metamorphic virus detection. Master Thesis, Sanjose state university
Szor, P.: The Art of Computer Virus Research and Defense. Addison-Wesley, Boston (2005)
Sridharan, S.M.: Hunting for metamorphic engines
Wong, W.: Analysis and detection of metamorphic computer viruses
Bin, S.A., Sharif, M.D.: Metamorphic worm that carries its own morphing engine
Stamp, M., Lin, D.: Hunting for undetectable metamorphic viruses. Master Thesis, Department of Computer science, SJSU, spring 2010
Kalbhor, A.: A tiered approach to detect metamorphic malware with hidden markov models
Govindaraj, S.: Practical detection of metamorphic virus. Master Thesis, Sanjose state university
Pryala Shyry, S.: Performance measurement in selfish overlay network by fuzzy logic deployment of overlay nodes. In: International Conference on Control Instrumentation, Communication Technologies (IEEE Xplore), ICCICCT 2014, pp. 717–721 (2014)
Chandrasekharan, M., Muralidharan, M.: Application of soft computing techniques in machining performance prediction and optimization: a literature review. Int. J. Adv. Manuf. Technol. 46, 445–464 (2010)
Choudhary, S.P.: A simple method for detection of metaphoric malware using dynamic analysis and text mining. Procedia Comput. Sci. 54, 265–270 (2015)
Lo, C.T.D., Pablo, O.: Towards an effective and efficient malware detection system. In: International Conference on Big Data (IEEE Xplore)
Author information
Authors and Affiliations
Corresponding authors
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this paper
Cite this paper
Prayla Shyry, S., Saranya, M., Mahithaa Sree, M. (2020). Efficiency Improvement in Code Emulation by Soft Computing Technique. In: Pandian, A.P., Senjyu, T., Islam, S.M.S., Wang, H. (eds) Proceeding of the International Conference on Computer Networks, Big Data and IoT (ICCBI - 2018). ICCBI 2018. Lecture Notes on Data Engineering and Communications Technologies, vol 31. Springer, Cham. https://doi.org/10.1007/978-3-030-24643-3_7
Download citation
DOI: https://doi.org/10.1007/978-3-030-24643-3_7
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-24642-6
Online ISBN: 978-3-030-24643-3
eBook Packages: EngineeringEngineering (R0)