Content deleted Content added
Significantly cleaned up the first half ot the article. Hopefully someone will add insights to this fascinating topic. Perhaps more historical analysis. |
No edit summary |
||
Line 4:
This technique is sometimes used by [[computer virus]]es, [[shellcode]]s and [[computer worm]]s to hide their presence.
Most [[anti virus-software]] and [[intrusion detection system]]s attempt to
[[Encryption]] is the most commonly used method of achieving polymorphism in code. However, not all of the code can be encrypted as it would be completely unusable. A small portion of it is left unencrypted and used to jumpstart the encrypted software. Anti-virus software targets this small unencrypted portion of code.
|