Compiler Architecture for Detection of Suspicious or Malicious Strings in a Program
Rajeshwari K Gundla
Rajeshwari K Gundla, Department of Information Technology, Ajeenkya D Y Patil University, Pune (Maharashtra), India.
Manuscript received on 29 May 2019 | Revised Manuscript received on 11 June 2019 | Manuscript Published on 22 June 2019 | PP: 878-880 | Volume-8 Issue-3S, February 2019 | Retrieval Number: C11870283S19/19©BEIESP
Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (

Abstract: Malware (i.e. malicious software) is one of the most serious security threat on the internet today. Malwares can be of various types such as virus, worms, Trojan horse, ransomware, adware, rootkit, spyware etc. Programmer write code to get desired results while doing this he/she can involve vulnerabilities in code, Attacker can exploit these vulnerabilities in the code in order to gain confidential information or gain unauthorized access to the user system. Programs need to be compiled and run to create an executable file for which compiler is needed. Compiler is a system program that translates a code written in source language into target language. In this paper we propose a model where we redesign a compiler in such a way that compiler identifies suspicious/malicious string at compile time itself. Compiler gives warning of suspicious code. Compiler comprises many phases. Lexical analysis is the first phase of the compiler which does many tasks such as removing whitespaces and comments, making entry to the symbol table, correlating line number with error message. Here we are adding additional task that is suspicious/malicious string detection to lexical analysis phase of the compiler. Static malware analysis can be done at compilation phase itself.
Keywords: Compiler Architecture, Lexical Analysis, Static Malware Analysis, Suspicious/Malicious String Detection.
Scope of the Article: Program Understanding and System Maintenance