We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 November 2024
Reseach Article

Reverse Engineering for Malicious Code Behavior Analysis using Virtual Security Patching

by A.EdwinRobert, G.Manivasagam, N.Sasirekha, Dr.M.Hemalatha
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 26 - Number 4
Year of Publication: 2011
Authors: A.EdwinRobert, G.Manivasagam, N.Sasirekha, Dr.M.Hemalatha
10.5120/3088-4233

A.EdwinRobert, G.Manivasagam, N.Sasirekha, Dr.M.Hemalatha . Reverse Engineering for Malicious Code Behavior Analysis using Virtual Security Patching. International Journal of Computer Applications. 26, 4 ( July 2011), 41-45. DOI=10.5120/3088-4233

@article{ 10.5120/3088-4233,
author = { A.EdwinRobert, G.Manivasagam, N.Sasirekha, Dr.M.Hemalatha },
title = { Reverse Engineering for Malicious Code Behavior Analysis using Virtual Security Patching },
journal = { International Journal of Computer Applications },
issue_date = { July 2011 },
volume = { 26 },
number = { 4 },
month = { July },
year = { 2011 },
issn = { 0975-8887 },
pages = { 41-45 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume26/number4/3088-4233/ },
doi = { 10.5120/3088-4233 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:11:59.373141+05:30
%A A.EdwinRobert
%A G.Manivasagam
%A N.Sasirekha
%A Dr.M.Hemalatha
%T Reverse Engineering for Malicious Code Behavior Analysis using Virtual Security Patching
%J International Journal of Computer Applications
%@ 0975-8887
%V 26
%N 4
%P 41-45
%D 2011
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Computer hardware and Internet is growing so fast today, security threats of malicious executable code are getting more serious. Basically, malicious executable codes are categorized into three kinds – virus, Spam, Trojan horse, and worm. Current anti-virus products cannot detect all the malicious codes, especially for those unseen, polymorphism malicious executable codes[1]. The newly developed virus will create the damages before it has been found and updated in database. Spy ware is becoming a real concern [2]. The proposed architecture classifies the behavior of the new type virus and it identifies the malicious code through the virtual server, where all the unwanted code executions and dependable are get refined first before it reaches the actual server. This phenomenon is known as virtual engineering. The security features in the virtual server get processed virtually through reverse engineering technique [3]. Here the user or the administrator checks the application first automatically in the virtual server and it analyze the behavior and filters the malicious code and protects the actual server, this process is very fast compare to other architecture which we have noticed in emerging operating systems.

References
  1. Bright Hub available at www.brighthub.com
  2. Info Security available at www.infosecurity-us.com
  3. Computer Security Training, Network Research & Resources available at www.sans.org
  4. PHYSORG available at www.physorg.com
  5. TalkTechToMe available at www.gfi.com/blog/tag/patch-management
  6. HACKER BOSS available at www.hackerboss.com
  7. Function Extraction Technology: Automated Calculation of Computer Progam Behavior available at www.cert.org/sse/fxmc.html
  8. Web Application Vulnerabilities available at www.acunetix.com/vulnerabilities
  9. D.Slur, J.Crupi, and D.Malks, “Core J2EE patterns: Best practices and architecture strategies”. Sun Micro Systems, 2001.
  10. G.Abowd, R.Allen, and D.Garlan, “Using Style to Give Meaning to Software Architecture”, ACM, New York, 1993.
  11. guardian.co.uk available at www.guardian.co.uk/2011/google-android- patent-lawsuits-batt.
  12. Peter Braun, Manfred Broy, Frank Houdek, Matthias Kirchmayr and Mark Müller,et al.Online First™, 20 October 2010
  13. Securing SQL Server available at www.securingsqlserver.com/tag/sql-injection
  14. Performance comparison and analysis of mobile ad hoc routing protocols: An International Journal (CSEIJ), Vol.1, No.1, April 2011
  15. Dahl O.-J., Dijkstra E. W., and Hoare C. A.,Structured Programming, Academic Press, 1972.
Index Terms

Computer Science
Information Sciences

Keywords

Function Extraction Technology Malicious code Patching Reverse Engineering Security threats Virtual Engineering