Malware dynamic analysis evasion techniques: A survey
The cyber world is plagued with ever-evolving malware that readily infiltrate all defense
mechanisms, operate viciously unbeknownst to the user, and surreptitiously exfiltrate …
mechanisms, operate viciously unbeknownst to the user, and surreptitiously exfiltrate …
Protecting software through obfuscation: Can it keep pace with progress in code analysis?
Software obfuscation has always been a controversially discussed research area. While
theoretical results indicate that provably secure obfuscation in general is impossible, its …
theoretical results indicate that provably secure obfuscation in general is impossible, its …
Automated classification and analysis of internet malware
Numerous attacks, such as worms, phishing, and botnets, threaten the availability of the
Internet, the integrity of its hosts, and the privacy of its users. A core element of defense …
Internet, the integrity of its hosts, and the privacy of its users. A core element of defense …
Exploring multiple execution paths for malware analysis
Malicious code (or Malware) is defined as software that fulfills the deliberately harmful intent
of an attacker. Malware analysis is the process of determining the behavior and purpose of a …
of an attacker. Malware analysis is the process of determining the behavior and purpose of a …
System and method for detecting time-bomb malware
S Paithane, M Vincent, S Vashisht… - US Patent 9,536,091, 2017 - Google Patents
6.424, 627 B1 7/2002 Sorhaug et al. 8,069,484 B2 11/2011 McMillan et al. 6,484.315 B1
11/2002 Ziese 8,087.086 B1 12/2011 Lai et al. 6,487,666 B1 11/2002 Shanklin et al. 8 …
11/2002 Ziese 8,087.086 B1 12/2011 Lai et al. 6,487,666 B1 11/2002 Shanklin et al. 8 …
Hercule: Attack story reconstruction via community discovery on correlated log graph
Advanced cyber attacks consist of multiple stages aimed at being stealthy and elusive. Such
attack patterns leave their footprints spatio-temporally dispersed across many different logs …
attack patterns leave their footprints spatio-temporally dispersed across many different logs …
System and method for detecting time-bomb malware
S Paithane, M Vincent, S Vashisht… - US Patent 10,083,302, 2018 - Google Patents
According to one embodiment, a system comprises one or more counters; comparison logic;
and one or more hardware processors communicatively coupled to the one or more …
and one or more hardware processors communicatively coupled to the one or more …
A survey on automated dynamic malware analysis evasion and counter-evasion: Pc, mobile, and web
Automated dynamic malware analysis systems are important in combating the proliferation
of modern malware. Unfortunately, malware can often easily detect and evade these …
of modern malware. Unfortunately, malware can often easily detect and evade these …
Practical enclave malware with Intel SGX
Modern CPU architectures offer strong isolation guarantees towards user applications in the
form of enclaves. However, Intel's threat model for SGX assumes fully trusted enclaves and …
form of enclaves. However, Intel's threat model for SGX assumes fully trusted enclaves and …
[PDF][PDF] Impeding Malware Analysis Using Conditional Code Obfuscation.
Malware programs that incorporate trigger-based behavior initiate malicious activities based
on conditions satisfied only by specific inputs. State-of-the-art malware analyzers discover …
on conditions satisfied only by specific inputs. State-of-the-art malware analyzers discover …