
In this paper, we have discussed about:-
1. Polymorphic and metamorphic encryption
2. Anti-debugging tricks
3. Ant-traffic analysis stuff
4. Deployed tactics to detect virulent code.
Right now, subscription is required to read paper. We will release it after couple of weeks.