The rise of “malware”: Bibliometric analysis of malware study

MF Ab Razak, NB Anuar, R Salleh, A Firdaus - Journal of Network and …, 2016 - Elsevier
Malicious software (malware) is a computer program designed to create harmful and
undesirable effects. It considered as one of the many dangerous threats for Internet users …

Semantics-aware detection of targeted attacks: a survey

R Luh, S Marschalek, M Kaiser, H Janicke… - Journal of Computer …, 2017 - Springer
In today's interconnected digital world, targeted attacks have become a serious threat to
conventional computer systems and critical infrastructure alike. Many researchers contribute …

[HTML][HTML] Getting to the root of the problem: A detailed comparison of kernel and user level data for dynamic malware analysis

M Nunes, P Burnap, O Rana, P Reinecke… - Journal of Information …, 2019 - Elsevier
Dynamic malware analysis is fast gaining popularity over static analysis since it is not easily
defeated by evasion tactics such as obfuscation and polymorphism. During dynamic …

Toward a taxonomy of malware behaviors

ARA Grégio, VM Afonso, DSF Filho… - The Computer …, 2015 - academic.oup.com
Malicious code attacks pose a serious threat to the security of information systems, as
malware evolved from innocuous conceptual software to advanced and destructive cyber …

The evolution of process hiding techniques in malware-current threats and possible countermeasures

S Eresheim, R Luh, S Schrittwieser - Journal of Information …, 2017 - jstage.jst.go.jp
Rootkits constitute a significant threat to modern computing and information systems. Since
their first appearance in the early 1990's they have steadily evolved, adapting to ever …

Terminator: A Secure Coprocessor to Accelerate Real-Time AntiViruses Using Inspection Breakpoints

M Botacin, FB Moreira, POA Navaux, A Grégio… - ACM Transactions on …, 2022 - dl.acm.org
AntiViruses (AVs) are essential to face the myriad of malware threatening Internet users. AVs
operate in two modes: on-demand checks and real-time verification. Software-based real …

[PDF][PDF] Mmale—a methodology for malware analysis in linux environments

JJ de Vicente Mohino, J Bermejo-Higuera… - … , Materials & Continua, 2021 - academia.edu
In a computer environment, an operating system is prone to malware, and even the Linux
operating system is not an exception. In recent years, malware has evolved, and attackers …

MalView: Interactive visual analytics for comprehending malware behavior

HN Nguyen, F Abri, V Pham, M Chatterjee… - IEEE …, 2022 - ieeexplore.ieee.org
Malicious applications are usually comprehended through two major techniques, namely
static and dynamic analyses. Through static analysis, a given malicious program is parsed …

Classifying malicious system behavior using event propagation trees

S Marschalek, R Luh, M Kaiser… - Proceedings of the 17th …, 2015 - dl.acm.org
Behavior-based analysis of dynamically executed software has become an established
technique to identifying and analyzing potential malware. Most solutions rely on API or …

Interactive, visual-aided tools to analyze malware behavior

ARA Grégio, AOC Baruque, VM Afonso… - … Science and Its …, 2012 - Springer
Malicious software attacks can disrupt information systems, violating security principles of
availability, confidentiality and integrity. Attackers use malware to gain control, steal data …