Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 226,930,399 papers from all fields of science
Search
Sign In
Create Free Account
Polymorphic engine
Known as:
Engine (disambiguation)
, Mutating engine
, Mutation engine
A polymorphic engine (sometimes called mutation engine or mutating engine) is a computer program that can be used to transform a program into a…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
8 relations
Computer program
Computer virus
Dark Avenger
Encryption
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2019
2019
Antiforensic techniques deployed by custom developed malware in evading anti-virus detection
Ivica Stipovic
arXiv.org
2019
Corpus ID: 195584105
Both malware and antivirus detection tools advance in their capabilities. Malware aim is to evade the detection while antivirus…
Expand
2015
2015
The Threat of Obfuscated Zero Day Polymorphic Malwares: An Analysis
Brightstarlang Wanswett
,
H. Kalita
International Conference on Computational…
2015
Corpus ID: 17747655
When a Zero day malware crops up and with the advent of polymorphism and obfuscation, such malware poses a serious threat to…
Expand
2011
2011
L-WMxD: Lexical based Webmail XSS Discoverer
Zhushou Tang
,
Haojin Zhu
,
Z. Cao
,
Shuai Zhao
Conference on Computer Communications Workshops
2011
Corpus ID: 17158276
XSS (Cross-Site Scripting) is a major security threat for web applications. Due to lack of source code of web application, fuzz…
Expand
2009
2009
A rough set approach for automatic key attributes identification of zero-day polymorphic worms
Wen-Chen Sun
,
Yi-Ming Chen
Expert systems with applications
2009
Corpus ID: 33048762
2008
2008
New Polymorphic Worm Detection based on Instruction Distribution and Signature
Hanyoung Noh
,
Jangseong Kim
,
C. Yeun
,
Kwangjo Kim
2008
Corpus ID: 17836118
The financial loss that suffered from malicious worm is known to be growing annually. In order to deal with this problem many…
Expand
2008
2008
Constructing malware normalizers using term rewriting
Andrew Walenstein
,
Rachit Mathur
,
Mohamed R. Chouchane
,
Arun Lakhotia
Journal in Computer Virology
2008
Corpus ID: 1730980
A malware mutation engine is able to transform a malicious program to create a different version of the program. Such mutation…
Expand
2007
2007
Prevention, Detection and Recovery from Cyber-Attacks Using a Multilevel Agent Architecture
Dennis Edwards
,
S. Simmons
,
N. Wilde
International Symposium on Service Oriented…
2007
Corpus ID: 18579809
Intelligent software agents offer great potential for improving the operation and response of power grids. These agents are…
Expand
2007
2007
Improving Signature Testing through Dynamic Data Flow Analysis
Christopher Krügel
,
D. Balzarotti
,
William K. Robertson
,
Giovanni Vigna
Asia-Pacific Computer Systems Architecture…
2007
Corpus ID: 11246173
The effectiveness and precision of network-based intrusion detection signatures can be evaluated either by direct analysis of the…
Expand
2006
2006
Polymorphic worm detection and defense: system design, experimental methodology, and data resources
Jisheng Wang
,
I. Hamadeh
,
G. Kesidis
,
David J. Miller
LSAD '06
2006
Corpus ID: 18807841
The polymorphic variety of Internet worms presents a formidable challenge to network intrusion detection and methods designed to…
Expand
2006
2006
A Quasi-Species Approach for Modeling the Dynamics of Polymorphic Worms
B. Stephenson
,
B. Sikdar
Proceedings IEEE INFOCOM . 25TH IEEE…
2006
Corpus ID: 2941379
Polymorphic worms can change their byte sequence as they replicate and propagate, thwarting the traditional signature analysis…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE
or Only Accept Required