International Journal of Computer Applications |
Foundation of Computer Science (FCS), NY, USA |
Volume 26 - Number 4 |
Year of Publication: 2011 |
Authors: A.EdwinRobert, G.Manivasagam, N.Sasirekha, Dr.M.Hemalatha |
10.5120/3088-4233 |
A.EdwinRobert, G.Manivasagam, N.Sasirekha, Dr.M.Hemalatha . Reverse Engineering for Malicious Code Behavior Analysis using Virtual Security Patching. International Journal of Computer Applications. 26, 4 ( July 2011), 41-45. DOI=10.5120/3088-4233
Computer hardware and Internet is growing so fast today, security threats of malicious executable code are getting more serious. Basically, malicious executable codes are categorized into three kinds – virus, Spam, Trojan horse, and worm. Current anti-virus products cannot detect all the malicious codes, especially for those unseen, polymorphism malicious executable codes[1]. The newly developed virus will create the damages before it has been found and updated in database. Spy ware is becoming a real concern [2]. The proposed architecture classifies the behavior of the new type virus and it identifies the malicious code through the virtual server, where all the unwanted code executions and dependable are get refined first before it reaches the actual server. This phenomenon is known as virtual engineering. The security features in the virtual server get processed virtually through reverse engineering technique [3]. Here the user or the administrator checks the application first automatically in the virtual server and it analyze the behavior and filters the malicious code and protects the actual server, this process is very fast compare to other architecture which we have noticed in emerging operating systems.