Malware dynamic analysis evasion techniques: A survey

A Afianian, S Niksefat, B Sadeghiyan… - ACM Computing Surveys …, 2019 - dl.acm.org
The cyber world is plagued with ever-evolving malware that readily infiltrate all defense
mechanisms, operate viciously unbeknownst to the user, and surreptitiously exfiltrate …

Protecting software through obfuscation: Can it keep pace with progress in code analysis?

S Schrittwieser, S Katzenbeisser, J Kinder… - Acm computing surveys …, 2016 - dl.acm.org
Software obfuscation has always been a controversially discussed research area. While
theoretical results indicate that provably secure obfuscation in general is impossible, its …

Automated classification and analysis of internet malware

M Bailey, J Oberheide, J Andersen, ZM Mao… - Recent Advances in …, 2007 - Springer
Numerous attacks, such as worms, phishing, and botnets, threaten the availability of the
Internet, the integrity of its hosts, and the privacy of its users. A core element of defense …

Exploring multiple execution paths for malware analysis

A Moser, C Kruegel, E Kirda - … on Security and Privacy (SP'07), 2007 - ieeexplore.ieee.org
Malicious code (or Malware) is defined as software that fulfills the deliberately harmful intent
of an attacker. Malware analysis is the process of determining the behavior and purpose of a …

System and method for detecting time-bomb malware

S Paithane, M Vincent, S Vashisht… - US Patent 9,536,091, 2017 - Google Patents
6.424, 627 B1 7/2002 Sorhaug et al. 8,069,484 B2 11/2011 McMillan et al. 6,484.315 B1
11/2002 Ziese 8,087.086 B1 12/2011 Lai et al. 6,487,666 B1 11/2002 Shanklin et al. 8 …

Hercule: Attack story reconstruction via community discovery on correlated log graph

K Pei, Z Gu, B Saltaformaggio, S Ma, F Wang… - Proceedings of the …, 2016 - dl.acm.org
Advanced cyber attacks consist of multiple stages aimed at being stealthy and elusive. Such
attack patterns leave their footprints spatio-temporally dispersed across many different logs …

System and method for detecting time-bomb malware

S Paithane, M Vincent, S Vashisht… - US Patent 10,083,302, 2018 - Google Patents
According to one embodiment, a system comprises one or more counters; comparison logic;
and one or more hardware processors communicatively coupled to the one or more …

A survey on automated dynamic malware analysis evasion and counter-evasion: Pc, mobile, and web

A Bulazel, B Yener - Proceedings of the 1st Reversing and Offensive …, 2017 - dl.acm.org
Automated dynamic malware analysis systems are important in combating the proliferation
of modern malware. Unfortunately, malware can often easily detect and evade these …

Practical enclave malware with Intel SGX

M Schwarz, S Weiser, D Gruss - Detection of Intrusions and Malware, and …, 2019 - Springer
Modern CPU architectures offer strong isolation guarantees towards user applications in the
form of enclaves. However, Intel's threat model for SGX assumes fully trusted enclaves and …

[PDF][PDF] Impeding Malware Analysis Using Conditional Code Obfuscation.

MI Sharif, A Lanzi, JT Giffin, W Lee - NDSS, 2008 - llvm.org
Malware programs that incorporate trigger-based behavior initiate malicious activities based
on conditions satisfied only by specific inputs. State-of-the-art malware analyzers discover …