Virus Scan Using Hardware Acceleration

    11 Votes

Recent expansion of the computer network opened a possibility of explosive spread of computer viruses. A hardware accelerated based computer virus scan system is proposed in this study. To satisfy the high speed network, three strategies are selected.First, a special accelerator card is used to accelerate the speed of virus scan. Second, a more effective protocol is designed for the communication between the client and the virus scan server.

Third one is to enhance the capability of concurrent processing of the system. Experimental results demonstrate that the virus scan system is of large throughput and high accuracy. Go through the attached seminar report for Virus Scan Using Hardware Acceleration design and implementation.

Malware, short for malicious software, is software designed to infiltrate or damage a computer system without the owner’s informed consent. The expression is a general term used by computer professionals to mean a variety of forms of hostile, intrusive, or annoying software or program code. The term ”computer virus” is sometimes used as a catch all phrase to include all types of malware, including true viruses. Software is considered malware based on the perceived intent of the creator rather than any particular features. 

Malware includes computer viruses, worms, trojan horses, most rootkits, spyware, dishonest adware, crimeware and other malicious and unwanted software. In law, malware is sometimes known as a computer contaminant. Malware is not the same as defective software, that is, software that has a legitimate purpose but contains harmful bugs. The prevalence of malware as a vehicle for organized Internet crime, along with the general inability of traditional anti malware protection platforms to protect against the continuous stream of unique and newly produced professional malware, has seen the adoption of a new mindset for businesses operating on the Internet  the acknowledgment that some sizable percentage of Internet customers will always be infected for some reason or other, and that they need to continue doing business with infected customers. The result is a greater emphasis on back office systems designed to spot fraudulent activities associated with advanced malware operating on customers computers. The best known malwares are viruses,worms and trojan horses.


The term computer virus is used for a program that has infected some executable software and that causes that software, when run, to spread the virus to other executable software. Viruses may also contain a payload that performs other actions, often malicious. Computer viruses are harmful and have the following features

  • Computer virus is an executable program which can attack the host program.
  • Computer virus can put a precise copy of itself or a possibly evolved copy of itself in the other programs (namely the host programs) by modifying the other programs, thereby infecting the host programs.
  • Computer virus can also modify the relative information or parts of the host program thereby infecting the host program.


A worm is a program that actively transmits itself over a network to infect other computers. It too may carry a payload.The first worms, network borne infectious programs, originated not on personal computers, but on multitasking Unix systems. The first well known worm was the Internet Worm of 1988, which infected SunOS and VAX BSD systems. Unlike a virus, this worm did not insert itself into other programs. Instead, it exploited security holes in network server programs and started itself running as a separate process. This same behavior is used by today’s worms as well.

Trojan horses

For a malicious program to accomplish its goals, it must be able to do so without being shut down, or deleted by the user or administrator of the computer on which it is running. Concealment can also help get the malware installed in the first place. When a malicious program is disguised as something innocuous or desirable, users may be tempted to install it without knowing what it does. This is the technique of the Trojan horse or trojan. In broad terms, a Trojan horse is any program that invites the user to run it, concealing a harmful or malicious payload. The payload may take effect immediately and can lead to many undesirable effects, such as deleting the user’s files or further install malicious or undesirable software. Trojan horses known as droppers are used to start off a worm outbreak, by injecting the worm into users’ local networks.

One of the most common ways that spyware is distributed is as a Trojan horse, bundled with a piece of desirable software that the user downloads from the Internet. When the user installs the software, the spyware is installed alongside. Spyware authors who attempt to act in a legal fashion may include an end user license agreement that states the behavior of the spyware in loose terms, which the users are unlikely to read or understand. 

Download this file (Virus_scan_using_hardware_acceleration_ver_2.pdf)Virus Scan Using Hardware Acceleration[Seminar Report]309 Kb