Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

SelectedWorks

2013

Computer vulnerability

Articles 1 - 3 of 3

Full-Text Articles in Physical Sciences and Mathematics

How Do Viruses Attack Anti-Virus Programs, Umakant Mishra Jul 2013

How Do Viruses Attack Anti-Virus Programs, Umakant Mishra

Umakant Mishra

As the anti-viruses run in a trusted kernel level any loophole in the anti-virus program can enable attackers to take full control over the computer system and steal data or do serious damages. Hence the anti-virus engines must be developed with proper security in mind. The ant-virus should be able to any type of specially created executable files, compression packages or documents that are intentionally created to exploit the anti-virus’s weakness.

Viruses are present in almost every system even though there are anti-viruses installed. This is because every anti-virus, however good it may be, leads to some extent of false …


Protecting Anti-Virus Programs From Viral Attacks, Umakant Mishra Jul 2013

Protecting Anti-Virus Programs From Viral Attacks, Umakant Mishra

Umakant Mishra

During a fight between viruses and anti-viruses it is not always predictable that the anti-virus is going to win. There are many malicious viruses which target to attack and paralyze the anti-viruses. It is necessary for an anti-virus to detect and destroy the malware before its own files are detected and destroyed by the malware. The anti-virus may follow thorough testing and auditing procedures to fix all its bugs before releasing the software in the market. Besides the anti-virus may use all the obfuscation techniques like polymorphism that the viruses generally use to hide their codes. This article also shows …


Methods Of Repairing Virus Infected Files, A Triz Based Analysis, Umakant Mishra May 2013

Methods Of Repairing Virus Infected Files, A Triz Based Analysis, Umakant Mishra

Umakant Mishra

Some computer viruses damage the host file during infection either partially or fully. These types of viruses are known as “file modifying viruses”. In these cases, the chance of recovery is less, but the anti-virus has to apply various methods with hope. The virus cleaner must know the characteristics of a virus in order to remove that virus. It cannot remove an unknown virus whose methods of infection are not known. If a virus is wrongly detected to be a different virus, then the cleaner will do wrong operations and build a garbage file.

Most viruses are capable of fixing …