Discuss your strategy for detecting the polymorphic virus

Assignment Help Computer Engineering
Reference no: EM131208337

I have created 10 .com files that use last week's concept of polymorphism. Each of these files is different in contents than the other but they all have the same basic purpose of printing "Hello World!" For the purposes of this assignment, let's consider that printed statement to be the "execution of the virus". This is important because one of the files will not print that statement. Your detector should consider that and not classify it as a virus. You should be creating a detector in C or C++ that can identify the "Hello World! virus" I have created. You can download the 10 .com files from here as a zip:

https://dl.dropboxusercontent.com/u/90376830/week%206-easier.zip

For your write-up on this assignment, discuss your strategy for detecting the polymorphic virus. What approach did you use and what commonality did you search for? Provide your source code and discuss the effectiveness of your approach and the results against the set of .com files I provided.

Reference no: EM131208337

Questions Cloud

What will the pullout torque be : If the motor in Problem 6-15 is to be driven from a 460-V 50-Hz power supply, what will the pullout torque be? What will the slip be at pullout?
Average speed of the boat relative to the water : A boat traveled a distance of 152 mi and then came right back. If the speed of the current was 7 mph and the total trip took 6 hours and 20 minutes, find the average speed of the boat relative to the water.
Define and describe the purpose of dns : Discuss the differences between ‘implementation' and ‘policy', and describe the importance of their separation. Using information from the course, including the lectures and weekly reading, develop an outline of your security policy which addresses..
Perimeter of the triangle with the vertices : Find the perimeter of the triangle with the vertices at (1, -1), (-3, 3), and (-3, -3). Show work please.
Discuss your strategy for detecting the polymorphic virus : For your write-up on this assignment, discuss your strategy for detecting the polymorphic virus. What approach did you use and what commonality did you search for
Information to prepare statement of cash flows : Use the following information to prepare a statement of cash flows for the Ace Company for the year ended December 31, 2020. The company borrowed $20,000 on a two-year note from the bank. Dividends of $8,000 were paid in cash.
Program using raptor flowchart : Slot Machine Simulation: A slot machine is a gambling device that user inserts money into and then pulls a lever (or press a button), and then the slot machine then displays a set of random images. If two or more of the images match, the user wins..
What cultural tools might you use to maintain the traditions : What cultural tools might you use to maintain the historical traditions of your country? Please give two specific examples. Provide two positive examples of cross-cultural influences to the people of your country. Why would they be considered positi..
Which ethical system does nate use in his decision making : PRINCIPLES OF MANAGEMENT: MGMT 1100 - Which ethical system does Nate use in his decision making and which ethical system does Keith use to guide him in his decision making?

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd