By Topic

The Application Research of Characteristic Code Techniques in Attack and Defense

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

1 Author(s)
Yingchun Zhang ; Dept. of Comput., Shanghai Tech. Inst. of Electron. & Inf., Shanghai, China

In order to explore the development trends of viruses attack-defense tactics, diversified characteristic code techniques are deeply discussed in this paper. By experiments of manually locating, analyzing and verifying the mechanism of three techniques, single characteristic code, multiple characteristic code and composite characteristic code, have been expounded profoundly and compared distinctly. Then several technological means, such as alteration, packing and encryption are used for viruses to escape from being detected and killed. However, the effect of simply using one characteristic code technique remains a doubt, once the single characteristic code technique is joined with proactive protection, greater breakthrough can be archived in attack-defense counter.

Published in:

Information Technology, Computer Engineering and Management Sciences (ICM), 2011 International Conference on  (Volume:2 )

Date of Conference:

24-25 Sept. 2011