Management tradeoffs in anti-virus strategies
Information and Management
ISSTA '04 Proceedings of the 2004 ACM SIGSOFT international symposium on Software testing and analysis
InfoSecCD '06 Proceedings of the 3rd annual conference on Information security curriculum development
Hi-index | 0.00 |
This paper proposes a new technique for malicious object detec-tion and identification. The technique is based on a concept of vi-rus inquiry. The inquiry is an activity that is performed by the malicious object during its initiation. The malicious object uses this activity to ensure its uniqueness in memory. The inquiry can be regarded as a common behavior of malicious object such as viruses. The proposed system is designed using the concept of Ob-ject Oriented Programming (OOP) that treats the operating system, user program, and virus as objects. It is constructed of three ele-mentary objects that perform their activities depending on two da-tabases.