Some computer virus authors have made use of cryptography themselves, in attempts to make their creations more difficult to detect or more difficult to analyse, or as part of the destructive or annoying payloads they carry. While cryptography does not play a key role in most of the viruses currently responsible for the virus problem, the issue of cryptography in computer viruses is worth at least a passing glance. The most common use of encryption in computer viruses is as part of polymorphism. A polymorphic virus is one that changes form as it spreads, so that two different files infected with the virus will not necessarily have any significant byte-strings in common. In machine-language viruses, polymorphism is usually achieved by splitting the virus into three different sections: a short piece of decryptor code, a cryptographic key, and the main functional part of the virus. When the virus creates a new copy of itself, it selects a new cryptographic key, encrypts the main functional part of itself with that key, and generates (using any of a variety of methods) a new implementation of the decryptor code.
Projects, Thesis, Final Year Projects, IT, MBA, Seminar
Projects, Thesis, Final Year Projects, IT, MBA, Seminar
Donate To Maintain This Blog
Dear Readers,
Donate (INR 1/-)At-least To Maintain This ProjectsWorlds
Total Pageviews
Most Popular Posts
-
This is a MBA International Business project report on Export Process and Documentation and was submitted in partial fulfillment of PG Diplo...
-
Smart Sensors PPT PowerPoints that can be used to Seminar topics and Slide Projects. Introduction, IEEE 1451 family, 1451.3 Overview, ...
-
Leather Technology Seminar Topics And Project Topics Titles (B.tech/ B.E Leather Technology) List given Below are the Seminar Topics And pro...
-
Title : Development of Modbus based Digital I/O Card with RS-485 Port for Industrial Applications Abstract: This is Electronics project repo...
-
Title: Capacity of Frozen Soil for Shallow Tunnel Pre-Support Underneath a Building Founded on Wooden Piles Department Of Civil Engineering ...
-
IMPLEMENTATION OF HAMMING-CUT-MATCHING ALGORITHM IN IRIS RECOGNITION This paper includes the implem...
-
Haptics refers to sensing and manipulationn through touch. The word comes from thee Greek ‘haptesthai’, meaning ‘to touch’.The histo...
-
Title: Analysis of Drug Delivery in the Eye Using Magnetic Resonance Imaging This is a Chemical and Biomolecular Engineering Theses Abstra...
-
The most modern telephone is the cellular telephone, or commonly called a cell phone. A cellular telephone is designed to give the ...
-
An embedded system is a special-purpose computer system designed to perform one or a few dedicated functions, sometimes with real-ti...
DEAR READERS: As There is problem in www.projectsworld.co.cc It is changed to
www.projectsworlds.blogspot.com
For Any Feedback and Suggestions send mail.
If There is any problem in the Document View or Download please send mail to projectsworld@live.com
www.projectsworlds.blogspot.com
For Any Feedback and Suggestions send mail.
If There is any problem in the Document View or Download please send mail to projectsworld@live.com