Percentage | Grade |
---|---|
92 and above | A |
90 - 91 | A- |
88 - 89 | B+ |
82 - 87 | B |
80 - 81 | B- |
78 - 79 | C+ |
72 - 77 | C |
70 - 71 | C- |
68 - 69 | D+ |
62 - 67 | D |
60 - 61 | D- |
59 and below | F |
CS266HMK assignmentnumber yourlastname last4digitofyourstudentnumberThat is, the subject line must consist of four identifiers. There is no space within an identifier and each identifier is separated by a space.
E | - | C | - | - | - |
G | - | E | E | - | G |
- | G | C | E | J | G |
E | - | G | - | J | C |
E | - | J | - | - | G |
Metamorphic malware changes its internal structure across generations, but its functionality remains unchanged. Well-designed metamorphic malware will evade signature detection. Recent research has revealed techniques based on hidden Markov models (HMMs) for detecting many types of metamorphic malware, as well as techniques for evading such detection.
A worm is a type of malware that actively spreads across a network to other host systems. In this project we design and implement a metamorphic worm that carries its own morphing engine. This is challenging, since the morphing engine itself must be morphed across replications, which imposes significant restrictions on the structure of the worm. Our design also employs techniques to evade detection. We provide test results to confirm that this worm effectively evades signature and HMM-based detection.