CMSC 426/626 — Fall 2014
Home
Schedule/Lecture Notes
Labs
Projects
Exams
Resources
Staff
Syllabus
Lecture 7: Malicious Software II
Lecture 7 Notes (
PDF
,
DOCX
)
ClamAV
signature strings, part 1
and
part 2
Some sample
metamorphic coding techniques
Metamorphic Viruses: Analysis and Detection
by Evgenios Konstantinou