Measuring software obfuscation quality–a systematic literature review

SA Ebad, AA Darem, JH Abawajy - IEEE Access, 2021 - ieeexplore.ieee.org
Software obfuscation techniques are increasingly being used to prevent attackers from
exploiting security flaws and launching successful attacks. With research on software …

A novel graph-based approach for IoT botnet detection

HT Nguyen, QD Ngo, VH Le - International Journal of Information Security, 2020 - Springer
Abstract The Internet of things (IoT) is the extension of Internet connectivity into physical
devices and everyday objects. These IoT devices can communicate with others over the …

Hidden Markov models for malware classification

C Annachhatre, TH Austin, M Stamp - Journal of Computer Virology and …, 2015 - Springer
Previous research has shown that hidden Markov model (HMM) analysis is useful for
detecting certain challenging classes of malware. In this research, we consider the related …

Scalable function call graph-based malware classification

M Hassen, PK Chan - Proceedings of the Seventh ACM on Conference …, 2017 - dl.acm.org
In an attempt to preserve the structural information in malware binaries during feature
extraction, function call graph-based features have been used in various research works in …

Convolutional neural networks and extreme learning machines for malware classification

M Jain, W Andreopoulos, M Stamp - Journal of Computer Virology and …, 2020 - Springer
Research in the field of malware classification often relies on machine learning models that
are trained on high-level features, such as opcodes, function calls, and control flow graphs …

Evolution and detection of polymorphic and metamorphic malwares: A survey

A Sharma, SK Sahay - arXiv preprint arXiv:1406.7061, 2014 - arxiv.org
Malwares are big threat to digital world and evolving with high complexity. It can penetrate
networks, steal confidential information from computers, bring down servers and can cripple …

Evolution of malware and its detection techniques

SK Sahay, A Sharma, H Rathore - Information and Communication …, 2020 - Springer
In today's world, information is one of the most valuable assets, but there is a major threat to
it by the evolving second-generation sophisticated malware, because it can enter the …

[PDF][PDF] Network activity analysis of CryptoWall ransomware

K Cabaj, P Gawkowski, K Grochowski… - Przeglad …, 2015 - pe.org.pl
The paper presents the analysis of the CryptoWall ransomware network behaviour. In this
approach a HoneyPot technology as well as the automatic run-time malware analytical …

[HTML][HTML] Sigma: A semantic integrated graph matching approach for identifying reused functions in binary code

S Alrabaee, P Shirani, L Wang, M Debbabi - Digital Investigation, 2015 - Elsevier
The capability of efficiently recognizing reused functions for binary code is critical to many
digital forensics tasks, especially considering the fact that many modern malware typically …

Malware classification using static analysis based features

M Hassen, MM Carvalho… - 2017 IEEE symposium …, 2017 - ieeexplore.ieee.org
Anti-virus vendors receive hundreds of thousands of malware to be analysed each day.
Some are new malware while others are variations or evolutions of existing malware …