scholarly journals Virus signature detection algorithm

2021 ◽  
Vol 2131 (2) ◽  
pp. 022086
Author(s):  
D Zemlyanaya ◽  
N Boldyrikhin ◽  
A Svizhenko ◽  
B Yukhnov

Abstract The purpose of this research is to develop an algorithm for finding virus signatures. The method of searching for virus signatures was analyzed to achieve this goal. A brief description of the Boyer-Moore algorithm was also considered. The result of the research is a new algorithm that optimizes the speed of finding virus signatures by scanning the beginning and end of the file, since these are common cases where viruses are located. The practical significance of this research lies in the development of an algorithm for finding virus signatures, which reduces the risk of infection of the operating system with viruses and provides the ability to quickly detect malware.

2013 ◽  
Vol 443 ◽  
pp. 556-560
Author(s):  
Gao Ming He

This paper describes a system; CODESSEAL can provide protection and evaluation to system software. CODESSEAL was designed to protect embedded systems with sufficient expertise and resources to capture attack equipment and manipulator, not only to protect software but also to protect hardware. By using the reconfigurable hardware allows CODESSEAL to provide confidentiality, integrity of security services and a platform-independent program flow without having to redesign the processor. System uses software and data protection technology and designs cycle simulation methods for data analysis. Experimental results show that the protected instructions and data with a high level of safety can be realized a low, which in most cases the performance loss can be reduced to below 10%, so the research of software protection methods of the embedded operating system of hardware compiler has important practical significance.


2012 ◽  
Vol 201-202 ◽  
pp. 337-343 ◽  
Author(s):  
Ting Fang ◽  
Xin Jin ◽  
Xing Liu Hu ◽  
Pei Zhen Wang ◽  
Chong Dong

The paper proposes a novel insulator-contour-detection-algorithm on power transmission lines images. The insulator-contour-detection-algorithm will have very important academic and practical significance in helicopter or robot patrol system on power transmission lines. The physical characteristics of insulator are analyzed in detail to obtain image features of insulator, and the Hough transform based on gradient information is used to detect the ellipse on the image. After double thresholds processing to the size of ellipse, linear fitting about the center of ellipse, template matching of the center of ellipse based on hausdorff distance, the insulator ellipse is determined. The consuming time of the algorithm is about 50 to 200 ms, so the algorithm can meet the requirement of real-time system. The experiment result approves it.


2013 ◽  
Vol 281 ◽  
pp. 65-70
Author(s):  
Wen Dong Zhao ◽  
Hui Qi ◽  
Hai Yan Zhou

For the Development of China's transportation industry, to develop video-based vehicle detection system prohibited the need for pressure line, the article compares and learns from the existing video surveillance technology on the basis of intelligent transportation system’s analysis and research. According to distribution characteristic of central yellow line area roads, the article proposes the algorithm based on wavelet transform pressure line detection. It has more practical significance on achieving the testing about vehicles rolling pressure and the central yellow line area roads. Firstly, the central road of the yellow line is separated to narrow the scope of testing by wavelet transform technique for image segmentation; and then using image segmentation based on color histogram matching algorithm judges whether the vehicle is rolling and pressing the yellow line area. On this basis, we developed a prototype vehicle contraband detection system pressure lines, the results show that the success rate in detection, false detection rate and timeliness are superior to other algorithms, and better meets the needs of engineering practice.


Author(s):  
ALJI Mohamed ◽  
◽  
CHOUGDALI Khalid

When a computer gets involved in a crime, it is the mission of the digital forensic experts to extract the left binary artifacts on that device. Among those artifacts, there may be some volume shadow copy files left on the Windows operating system. Those files are snapshots of the volume recorded by the system in case of a needed restore to a specific past date. Before this study, we did not know if the valuable forensic information hold within those snapshot files can be exploited to locate suspicious timestamps in an NTFS formatted partition. This study provides the reader with an intersnapshot time analysis for detecting file system timestamp manipulation. In other words, we will leverage the presence of the time information within multiples volume shadow copies to detect any suspicious tampering of the file system timestamps. A detection algorithm of the suspicious timestamps is contributed. Its main role is to assist the digital investigator to spot the manipulation if it has occurred. In addition, a virtual environment has been set up to validate the use of the proposed algorithm for the detection.


2016 ◽  
Vol 25 (1) ◽  
Author(s):  
Roselie B. Alday ◽  
Jelyn G. Andal ◽  
Micah C. Ilagan ◽  
Niña Daniela A. Meliton ◽  
Marnely S. Mercado

Banko Sentral ng Pilipinas (BSP) released and redesigned/new Philippine peso bills last December 2010 in accordance to stop the proliferation of counterfeit money, but circulation of fake money continues. The project developed a mobile application that will help detect fake new Philippine bills by using an algorithm in a mobile application. The researchers devised a tool in detecting fake money by distinguishing between genuine and counterfeit Philippine peso bills using built-in phone camera. The method used in detecting fake money was image segmentation using Sobel Edge Detection Algorithm. It converted the image to grayscale and detected two kinds of edges in an image: Vertical Direction Edges and Horizontal Direction Edges. After the image was converted, it counts the number of white pixels which had been the basis to determine if it is fake or not. The mobile application is available for android operating system only. The programming language that the researchers used is Java. The application resulted to 50% - 70% accuracy in detecting fake bills because it uses a phone camera for detection instead of Ultra Violet Light. It is recommended that the design be enhanced by adding more functionality such as sending a message to the office of Banko Sentral ng Pilipinas (BSP) if the money is detected as fake.


2018 ◽  
Vol 9 (4) ◽  
pp. 13-29
Author(s):  
Dahai Cheng ◽  
Huigang Xu ◽  
Ruiliang Gong ◽  
Huan Huang

Sign in / Sign up

Export Citation Format

Share Document