Rogue programs: viruses, worms and Trojan horses
Rogue programs: viruses, worms and Trojan horses
Computers under attack: intruders, worms, and viruses
Computers under attack: intruders, worms, and viruses
IEEE Spectrum
Computer virus-antivirus coevolution
Communications of the ACM
Hi-index | 0.00 |
This note is concerned with the executive compressed worm virus and their detection. It is difficult to detect some worm viruses recently since their file structure adopts the type of executive compression which can be run of themselves in the compressed state. In fact there are some informations about executive compression type in the sections of compressed file structure including whether it is executive compressed or not and compression method if compressed. In this research, we have adopted the reverse assembling method to investigate the effective method for detecting the many varietal malicious codes that are generated in different types by the variating the compression methods.