![]() This paper attempts to solve this problem. It documents the CARO malware naming scheme completely, including the recently introduced changes. It will be made freely available on the Web and will be continuously updated as new changes are introduced. Its purpose is to serve as an easily and publicly accessible documentation of the latest state of the CARO Malware Naming Scheme.Äownload this paper as a ZIPped Word document Lack of a Common Virus Naming Standard 1.1.4. Lack of Reliable Means for Automatic Malware Identification 1.1.5. Lack of Reliable Means for Automatic Malware Classification 1.1.6. Inability to Enforce a Particular Naming Scheme 1.2. Naming after Some Text Found in the Virus 1.2.5. ![]() ![]() History of the CARO Malware Naming Scheme 2. Description of the CARO Malware Naming Scheme 2.1. Rules for Constructing Proper Family Names 2.4.3. References Appendix A - List of Permitted Platform Names In the first part of this paper we shall discuss why a malware naming scheme is needed, the various unsuccessful malware naming schemes that have been tried in the past and the history of the CARO Malware Naming Scheme.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |