Unleashing the hidden power of compiler optimization on binary code difference: An empirical study

X Ren, M Ho, J Ming, Y Lei, L Li - Proceedings of the 42nd ACM …, 2021 - dl.acm.org
Hunting binary code difference without source code (ie, binary diffing) has compelling
applications in software security. Due to the high variability of binary code, existing solutions …

Yamme: a yara-byte-signatures metamorphic mutation engine

A Coscia, V Dentamaro, S Galantucci… - IEEE Transactions …, 2023 - ieeexplore.ieee.org
Recognition of known malicious patterns through signature-based systems is unsuccessful
against malware for which no known signature exists to identify them. These include not only …

Structural features with nonnegative matrix factorization for metamorphic malware detection

YT Ling, NFM Sani, MT Abdullah, NAWA Hamid - Computers & Security, 2021 - Elsevier
Metamorphic malware is well known for evading signature-based detection by exploiting
various code obfuscation techniques. Current metamorphic malware detection approaches …

Memory-efficient detection of large-scale obfuscated malware

Y Wang, M Zhang - International Journal of Wireless and …, 2024 - inderscienceonline.com
Obfuscation techniques are frequently used in malicious programs to evade detection.
However, current effective methods often require much memory space during training. This …

Analyzing Implementation-Based SSL/TLS Vulnerabilities with Binary Semantics Analysis

L Wang, Y Yang, GR Alavalapati - … Conference on Security and Privacy in …, 2023 - Springer
SSL/TLS are cryptographic protocols created to protect the security and privacy over
computer network communication. As a critical security infrastructure on the internet, it has …

Searching for Malware Dataset: a Systematic Literature Review

LM Zagi, B Aziz - 2020 International Conference on Information …, 2020 - ieeexplore.ieee.org
Malware is one of the exciting topics widely discussed by both academicians and
researchers, but the source list of malware rarely provided. Therefore, this paper aims to …

Message-of-the-Day (MOTD) Banner Language Variations as an Adaptive Honeypot Deterrent of Unauthorized Access

F Sharevski, S Jevitz - Proceedings of the 16th International Conference …, 2021 - dl.acm.org
This study investigates the effect of a Message-of-the-Day (MOTD) system banner, written in
three languages: English, Russian, and Chinese, on deterring unauthorized access to …

Structural features with nonnegative matrix factorization for metamorphic malware detection

Y Tyng Ling, NF Mohd Sani, MT Abdullah… - 2021 - dl.acm.org
Metamorphic malware is well known for evading signature-based detection by exploiting
various code obfuscation techniques. Current metamorphic malware detection approaches …

[引用][C] Karma öznitelik kullanarak yazılım davranışlarının modellenmesi ve tespiti

M Nar - Fen Bilimleri Enstitüsü