1 / 12

Metamorphic Viruses

Metamorphic Viruses. Pat Walpole. Introduction. What are metamorphic viruses Why they are dangerous Defenses against them. Virus Camouflage Types. None Encrypted Polymorphic Metamorphic. No Camouflage. Myles Jordan [1]. Encrypted. Myles Jordan [1]. Polymorphic. Myles Jordan [1].

shawnn
Download Presentation

Metamorphic Viruses

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Metamorphic Viruses Pat Walpole

  2. Introduction • What are metamorphic viruses • Why they are dangerous • Defenses against them

  3. Virus Camouflage Types • None • Encrypted • Polymorphic • Metamorphic

  4. No Camouflage Myles Jordan [1]

  5. Encrypted Myles Jordan [1]

  6. Polymorphic Myles Jordan [1]

  7. Metamorphic Myles Jordan [1]

  8. Why Metamorphism is a Problem • Provides excellent camouflage for the virus code • Difficult for anti-virus programs to detect • Difficult for an IDS to detect

  9. General Virus Defenses • Do not run or install software from an untrusted source • Do not open email attachments unless you are 100% sure they are from a trusted source • Use a good antivirus program and keep it updated

  10. Anti Virus Program Techniques • Run suspected files in an emulator • Perform heuristic analysis on the behaviors of the program • False positives • May not find viruses that are event based

  11. Conclusion • Virus writers will always find ways to beat anti-virus protection • Metamorphism is a very effective camouflage technique • Keep your computer protected and practice safe computing

  12. References • [1] Jordan, Myles. Anti-Virus Research Dealing with Metamorphism. http://www3.ca.com/securityadvisor/newsinfo/collateral.aspx?cid=48051

More Related