A comparative assessment of malware classification using binary texture analysis and dynamic analysis
L Nataraj, V Yegneswaran, P Porras… - Proceedings of the 4th …, 2011 - dl.acm.org
AI techniques play an important role in automated malware classification. Several machine-
learning methods have been applied to classify or cluster malware into families, based on …
learning methods have been applied to classify or cluster malware into families, based on …
Network diversity: a security metric for evaluating the resilience of networks against zero-day attacks
Diversity has long been regarded as a security mechanism for improving the resilience of
software and networks against various attacks. More recently, diversity has found new …
software and networks against various attacks. More recently, diversity has found new …
Towards Large‐Scale, Heterogeneous Anomaly Detection Systems in Industrial Networks: A Survey of Current Trends
Industrial Networks (INs) are widespread environments where heterogeneous devices
collaborate to control and monitor physical processes. Some of the controlled processes …
collaborate to control and monitor physical processes. Some of the controlled processes …
Binclone: Detecting code clones in malware
MR Farhadi, BCM Fung, P Charland… - … on Software Security …, 2014 - ieeexplore.ieee.org
To gain an in-depth understanding of the behaviour of a malware, reverse engineers have to
disassemble the malware, analyze the resulting assembly code, and then archive the …
disassemble the malware, analyze the resulting assembly code, and then archive the …
Multiple instance learning for malware classification
This work addresses classification of unknown binaries executed in sandbox by modeling
their interaction with system resources (files, mutexes, registry keys and communication with …
their interaction with system resources (files, mutexes, registry keys and communication with …
Design of evaluation system for digital education operational skill competition based on blockchain
B Wu, Y Li - 2018 IEEE 15th international conference on e …, 2018 - ieeexplore.ieee.org
By letting students simulate operations and games on a digital education operation system,
schools are able to inspect learning achievement and teaching quality. In digital education …
schools are able to inspect learning achievement and teaching quality. In digital education …
Variant: a malware similarity testing framework
J Upchurch, X Zhou - 2015 10th International Conference on …, 2015 - ieeexplore.ieee.org
This paper describes Variant, a testing framework for projects attempting to locate variants of
malware families through similarity testing. The framework is a series of tests and data …
malware families through similarity testing. The framework is a series of tests and data …
[HTML][HTML] Improving file-level fuzzy hashes for malware variant classification
I Shiel, S O'Shaughnessy - Digital Investigation, 2019 - Elsevier
Malware analysts need to be able to accurately and swiftly predict family membership as
well as to determine that a suspect file contains malicious content. Previous research has …
well as to determine that a suspect file contains malicious content. Previous research has …
Scalable code clone search for malware analysis
MR Farhadi, BCM Fung, YB Fung, P Charland… - Digital …, 2015 - Elsevier
Reverse engineering is the primary step to analyze a piece of malware. After having
disassembled a malware binary, a reverse engineer needs to spend extensive effort …
disassembled a malware binary, a reverse engineer needs to spend extensive effort …
Malware triage for early identification of advanced persistent threat activities
G Laurenza, R Lazzeretti, L Mazzotti - Digital Threats: Research and …, 2020 - dl.acm.org
In the past decade, a new class of cyber-threats, known as “Advanced Persistent
Threat”(APT), has emerged and has been used by different organizations to perform …
Threat”(APT), has emerged and has been used by different organizations to perform …