Unleashing the hidden power of compiler optimization on binary code difference: An empirical study
Hunting binary code difference without source code (ie, binary diffing) has compelling
applications in software security. Due to the high variability of binary code, existing solutions …
applications in software security. Due to the high variability of binary code, existing solutions …
Yamme: a yara-byte-signatures metamorphic mutation engine
Recognition of known malicious patterns through signature-based systems is unsuccessful
against malware for which no known signature exists to identify them. These include not only …
against malware for which no known signature exists to identify them. These include not only …
Structural features with nonnegative matrix factorization for metamorphic malware detection
Metamorphic malware is well known for evading signature-based detection by exploiting
various code obfuscation techniques. Current metamorphic malware detection approaches …
various code obfuscation techniques. Current metamorphic malware detection approaches …
Memory-efficient detection of large-scale obfuscated malware
Y Wang, M Zhang - International Journal of Wireless and …, 2024 - inderscienceonline.com
Obfuscation techniques are frequently used in malicious programs to evade detection.
However, current effective methods often require much memory space during training. This …
However, current effective methods often require much memory space during training. This …
Analyzing Implementation-Based SSL/TLS Vulnerabilities with Binary Semantics Analysis
L Wang, Y Yang, GR Alavalapati - … Conference on Security and Privacy in …, 2023 - Springer
SSL/TLS are cryptographic protocols created to protect the security and privacy over
computer network communication. As a critical security infrastructure on the internet, it has …
computer network communication. As a critical security infrastructure on the internet, it has …
Searching for Malware Dataset: a Systematic Literature Review
Malware is one of the exciting topics widely discussed by both academicians and
researchers, but the source list of malware rarely provided. Therefore, this paper aims to …
researchers, but the source list of malware rarely provided. Therefore, this paper aims to …
Message-of-the-Day (MOTD) Banner Language Variations as an Adaptive Honeypot Deterrent of Unauthorized Access
F Sharevski, S Jevitz - Proceedings of the 16th International Conference …, 2021 - dl.acm.org
This study investigates the effect of a Message-of-the-Day (MOTD) system banner, written in
three languages: English, Russian, and Chinese, on deterring unauthorized access to …
three languages: English, Russian, and Chinese, on deterring unauthorized access to …
Structural features with nonnegative matrix factorization for metamorphic malware detection
Y Tyng Ling, NF Mohd Sani, MT Abdullah… - 2021 - dl.acm.org
Metamorphic malware is well known for evading signature-based detection by exploiting
various code obfuscation techniques. Current metamorphic malware detection approaches …
various code obfuscation techniques. Current metamorphic malware detection approaches …