A comparative assessment of malware classification using binary texture analysis and dynamic analysis

L Nataraj, V Yegneswaran, P Porras… - Proceedings of the 4th …, 2011 - dl.acm.org
AI techniques play an important role in automated malware classification. Several machine-
learning methods have been applied to classify or cluster malware into families, based on …

Network diversity: a security metric for evaluating the resilience of networks against zero-day attacks

M Zhang, L Wang, S Jajodia, A Singhal… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
Diversity has long been regarded as a security mechanism for improving the resilience of
software and networks against various attacks. More recently, diversity has found new …

Towards Large‐Scale, Heterogeneous Anomaly Detection Systems in Industrial Networks: A Survey of Current Trends

M Iturbe, I Garitano, U Zurutuza… - Security and …, 2017 - Wiley Online Library
Industrial Networks (INs) are widespread environments where heterogeneous devices
collaborate to control and monitor physical processes. Some of the controlled processes …

Binclone: Detecting code clones in malware

MR Farhadi, BCM Fung, P Charland… - … on Software Security …, 2014 - ieeexplore.ieee.org
To gain an in-depth understanding of the behaviour of a malware, reverse engineers have to
disassemble the malware, analyze the resulting assembly code, and then archive the …

Multiple instance learning for malware classification

J Stiborek, T Pevný, M Rehák - Expert Systems with Applications, 2018 - Elsevier
This work addresses classification of unknown binaries executed in sandbox by modeling
their interaction with system resources (files, mutexes, registry keys and communication with …

Design of evaluation system for digital education operational skill competition based on blockchain

B Wu, Y Li - 2018 IEEE 15th international conference on e …, 2018 - ieeexplore.ieee.org
By letting students simulate operations and games on a digital education operation system,
schools are able to inspect learning achievement and teaching quality. In digital education …

Variant: a malware similarity testing framework

J Upchurch, X Zhou - 2015 10th International Conference on …, 2015 - ieeexplore.ieee.org
This paper describes Variant, a testing framework for projects attempting to locate variants of
malware families through similarity testing. The framework is a series of tests and data …

[HTML][HTML] Improving file-level fuzzy hashes for malware variant classification

I Shiel, S O'Shaughnessy - Digital Investigation, 2019 - Elsevier
Malware analysts need to be able to accurately and swiftly predict family membership as
well as to determine that a suspect file contains malicious content. Previous research has …

Scalable code clone search for malware analysis

MR Farhadi, BCM Fung, YB Fung, P Charland… - Digital …, 2015 - Elsevier
Reverse engineering is the primary step to analyze a piece of malware. After having
disassembled a malware binary, a reverse engineer needs to spend extensive effort …

Malware triage for early identification of advanced persistent threat activities

G Laurenza, R Lazzeretti, L Mazzotti - Digital Threats: Research and …, 2020 - dl.acm.org
In the past decade, a new class of cyber-threats, known as “Advanced Persistent
Threat”(APT), has emerged and has been used by different organizations to perform …