Detection of Logic Bombs
Journal Title: International Journal of Engineering Sciences & Research Technology - Year 30, Vol 3, Issue 2
Abstract
Computer viruses are big threat to computer world; researchers doing work in this area have made various efforts in the direction of classification and detection methods of these viruses. Graph mining, system call arrangement and CFG analysis are some latest research activities in this field. The computability theory and the semi computable functions are quite important in our context of analyzing malicious activities. A mathematical model like random access stored program machine with the association of attached background is used by Ferenc Leitold while explaining modeling of viruses in his paper. Computer viruses like polymorphic viruses and metamorphic viruses use more efficient techniques for their evolution so it is required to use strong models for understanding their evolution and then apply detection followed by the process of removal. Code Emulation is one of the strongest ways to analyze computer viruses but the anti-emulation activities made by virus designers are also active. This paper involves the study of logic bombs.
Authors and Affiliations
Ankur Singh Bist
Relavant Approach to Assess the Performance of Dry-Biomass of Eichhornia Crassipes for Adsorption of Heavy Metal Ions from Aqueous Solutions
Heavy metals are the major sources of pollution which are added regularly to our water sources. present paper is an attempt to evaluate the adsorption of heavy metals like Cadmium (Cd), chromium (Cr), zinc (Zn), a...
DESIGN OF SEISMIC ISOLATION OF G+4 MULTI STORIED BUILDING
This paper presents the use of high damping rubber bearing system and lead plug bearing system as seismic isolation devices for the considered G + 4 multi storied building. The paper presents the provisions of AS...
ECONOMIC CONCEPTS OF ENERGY EFFICIENCY – A REVIEW
Energy security is the core of sustainable energy development. Energy efficiency is furthermore an important measure to ensure national energy supply security. According to the investigation of the number of p...
VEHICLE SHARING SYSTEM WITH FLEXBLE ARCHITECTURE
Vehicle sharing systems are the important in todays lifestyle. They should meet the features to answer the different user needs, and must be automated.As automatic system is used it avoid intermediaries between us...
PRESERVING DATABASE CONFIDENTIALITY USING USER KEY BASED ENCRYPTION
The security of database is very important as data is the most valuable asset in the modern environment. Various security methodologies are available to secure databases. Most of the available methodologies fo...