Categories
  Encyclosphere.org ENCYCLOREADER
  supported by EncyclosphereKSF

Malware polymorphism

From Citizendium - Reading time: 1 min

This article may be deleted soon.
To oppose or discuss a nomination, please go to CZ:Proposed for deletion and follow the instructions.

For the monthly nomination lists, see
Category:Articles for deletion.


This article is a stub and thus not approved.
Main Article
Discussion
Related Articles  [?]
Bibliography  [?]
External Links  [?]
Citable Version  [?]
 
This editable Main Article is under development and subject to a disclaimer.

In the context of computer malware, malware polymorphism, often phrased in the context of the malware itself such as polymorphic worm or polymorphic virus, in order to hide itself from malware detection tools (e.g., host intrusion detection system). A simple example would be a worm that contains malicious instructions, but inserts null instructions into the software payload, so:

  • Detection fails when looking for software of a specific length, because the number of null instructions is random in each copy
  • Detection fails when looking for a specific sequence of instructions that simply matches a pattern, and will not ignore null operations that change the content, but not the execution behavior, of the malware

Licensed under CC BY-SA 3.0 | Source: https://citizendium.org/wiki/Malware_polymorphism
18 views | Status: cached on November 20 2024 04:00:20
↧ Download this article as ZWI file
Encyclosphere.org EncycloReader is supported by the EncyclosphereKSF