Detection of Logic Bombs

Abstract

Computer viruses are big threat to computer world; researchers doing work in this area have made various efforts in the direction of classification and detection methods of these viruses. Graph mining, system call arrangement and CFG analysis are some latest research activities in this field. The computability theory and the semi computable functions are quite important in our context of analyzing malicious activities. A mathematical model like random access stored program machine with the association of attached background is used by Ferenc Leitold while explaining modeling of viruses in his paper. Computer viruses like polymorphic viruses and metamorphic viruses use more efficient techniques for their evolution so it is required to use strong models for understanding their evolution and then apply detection followed by the process of removal. Code Emulation is one of the strongest ways to analyze computer viruses but the anti-emulation activities made by virus designers are also active. This paper involves the study of logic bombs.

Authors and Affiliations

Ankur Singh Bist

Keywords

Related Articles

 Secure Data Transfer based on Wavelet Transform from Cryptographic and Steganographic Techniques

 In today’s world, there are a number of cryptographic and steganographic techniques used in order to have secured data transfer between a sender and a receiver. In this paper we present a new hybrid approach that...

 Optimization of Functional Food Ingredients and Their Processing Levels for Preparation of Vermicelli Using RSM

 Vermicelli is prepared using whole or refined wheat flour. Response surface methodology (RSM) is the tool used for process optimization that explores relationship between several processes and responses. In presen...

A NEW CONTROL STRATEGY FOR DFIG BASED WIND ENERGY SYSTEM USING BESS

This paper presents a new control strategy for a grid connected Doubly Fed Induction Generator (DFIG).In order to decouple the active and reactive powers generated by the machine, stator - flux oriented vector cont...

 ESAODV: IMPLEMENTATION AND DESIGN OF SECURE AND EFFICIENT AODV FOR WSN

 A number of different network technologies are now in these days developed using the ad hoc configuration of networks. Among the wireless sensor network is one of most frequently used network technology for applic...

RE3+(Ho3+ or Pr3+): Bi2O3-B2O3-LiF Glasses. Karuturi Srinivasa Rao*, Chandragiri Parthasarathi Reddy and Srinivasa Buddhudu

Graphical Evaluation and Review Technique commonly known as GERT, is a network analysis technique effectively used in project management that allows probabilistic treatment of both network logic and estimation of activi...

Download PDF file
  • EP ID EP117223
  • DOI -
  • Views 59
  • Downloads 0

How To Cite

Ankur Singh Bist (30).  Detection of Logic Bombs. International Journal of Engineering Sciences & Research Technology, 3(2), 777-779. https://europub.co.uk./articles/-A-117223