Malware detection issues, challenges, and future directions: A survey

FA Aboaoja, A Zainal, FA Ghaleb, BAS Al-Rimy… - Applied Sciences, 2022 - mdpi.com
The evolution of recent malicious software with the rising use of digital services has
increased the probability of corrupting data, stealing information, or other cybercrimes by …

Features engineering to differentiate between malware and legitimate software

AY Daeef, A Al-Naji, AK Nahar, J Chahl - Applied Sciences, 2023 - mdpi.com
Malware is the primary attack vector against the modern enterprise. Therefore, it is crucial for
businesses to exclude malware from their computer systems. The most responsive solution …

Toward an ensemble behavioral-based early evasive malware detection framework

FA Aboaoja, A Zainal, FA Ghaleb… - … Conference on Data …, 2021 - ieeexplore.ieee.org
Recently malware threats are evolved to be the most cyber security threats. Because of
obfuscation and evasion techniques, malware has become more sophisticated in terms of …

Dynamic extraction of initial behavior for evasive malware detection

FA Aboaoja, A Zainal, AM Ali, FA Ghaleb, FJ Alsolami… - Mathematics, 2023 - mdpi.com
Recently, malware has become more abundant and complex as the Internet has become
more widely used in daily services. Achieving satisfactory accuracy in malware detection is a …

Imaging and evaluating the memory access for malware

Ç Yücel, A Koltuksuz - Forensic Science International: Digital Investigation, 2020 - Elsevier
Malware analysis is a forensic process. After infection and the damage represented itself
with the full scale, then the analysis of the attack, the structure of the executable and the aim …

[HTML][HTML] Multinomial malware classification via low-level features

S Banin, GO Dyrkolbotn - Digital Investigation, 2018 - Elsevier
Because malicious software or (” malware”) is so frequently used in a cyber crimes, malware
detection and relevant research became a serious issue in the information security …

Defence against crypto-ransomware families using dynamic binary instrumentation and DLL injection

S Ramachandran, J Rami, A Shah… - … Security and Digital …, 2023 - inderscienceonline.com
In recent years, ransomware incidents are increasingly predominant among the nation's
state-sponsored hacker groups. The expertise and ease of deploying ransomware continue …

A Kullback-Liebler divergence-based representation algorithm for malware detection

FA Aboaoja, A Zainal, FA Ghaleb, NS Alghamdi… - PeerJ Computer …, 2023 - peerj.com
Background Malware, malicious software, is the major security concern of the digital realm.
Conventional cyber-security solutions are challenged by sophisticated malicious behaviors …

Machine learning analysis of memory images for process characterization and malware detection

S Lyles, M Desantis, J Donaldson… - 2022 52nd Annual …, 2022 - ieeexplore.ieee.org
As signature-based malware detection techniques mature, malware authors have been
forced to leave fewer footprints on target machines. Malicious activity can be conducted by …

Lightweight and Robust Malware Detection Using Dictionaries of API Calls

AY Daeef, A Al-Naji, J Chahl - Telecom, 2023 - mdpi.com
Malware in today's business world has become a powerful tool used by cyber attackers. It
has become more advanced, spreading quickly and causing significant harm. Modern …