[HTML][HTML] A systematic literature review on windows malware detection: Techniques, research issues, and future directions

P Maniriho, AN Mahmood, MJM Chowdhury - Journal of Systems and …, 2024 - Elsevier
The aim of this systematic literature review (SLR) is to provide a comprehensive overview of
the current state of Windows malware detection techniques, research issues, and future …

A comparison of static, dynamic, and hybrid analysis for malware detection

A Damodaran, FD Troia, CA Visaggio… - Journal of Computer …, 2017 - Springer
In this research, we compare malware detection techniques based on static, dynamic, and
hybrid analysis. Specifically, we train Hidden Markov Models (HMMs) on both static and …

Metamorphic malware and obfuscation: a survey of techniques, variants, and generation kits

K Brezinski, K Ferens - Security and Communication Networks, 2023 - Wiley Online Library
The competing landscape between malware authors and security analysts is an ever‐
changing battlefield over who can innovate over the other. While security analysts are …

Malware detection using machine learning and deep learning

H Rathore, S Agarwal, SK Sahay, M Sewak - Big Data Analytics: 6th …, 2018 - Springer
Research shows that over the last decade, malware have been growing exponentially,
causing substantial financial losses to various organizations. Different anti-malware …

[图书][B] Introduction to machine learning with applications in information security

M Stamp - 2022 - taylorfrancis.com
Introduction to Machine Learning with Applications in Information Security, Second Edition
provides a classroom-tested introduction to a wide variety of machine learning and deep …

Hidden Markov models for malware classification

C Annachhatre, TH Austin, M Stamp - Journal of Computer Virology and …, 2015 - Springer
Previous research has shown that hidden Markov model (HMM) analysis is useful for
detecting certain challenging classes of malware. In this research, we consider the related …

Didn't You Hear Me?---Towards More Successful Web Vulnerability Notifications

B Stock, G Pellegrino, F Li, M Backes, C Rossow - 2018 - publications.cispa.de
After treating the notification of affected parties as mere side-notes in research, our
community has recently put more focus on how vulnerability disclosure can be conducted at …

Firma: Malware clustering and network signature generation with mixed network behaviors

MZ Rafique, J Caballero - Research in Attacks, Intrusions, and Defenses …, 2013 - Springer
The ever-increasing number of malware families and polymorphic variants creates a
pressing need for automatic tools to cluster the collected malware into families and generate …

A lustrum of malware network communication: Evolution and insights

C Lever, P Kotzias, D Balzarotti… - … IEEE Symposium on …, 2017 - ieeexplore.ieee.org
Both the operational and academic security communities have used dynamic analysis
sandboxes to execute malware samples for roughly a decade. Network information derived …

{WebWitness}: Investigating, Categorizing, and Mitigating Malware Download Paths

T Nelms, R Perdisci, M Antonakakis… - 24th USENIX Security …, 2015 - usenix.org
Most modern malware download attacks occur via the browser, typically due to social
engineering and driveby downloads. In this paper, we study the “origin” of malware …