Measuring software obfuscation quality–a systematic literature review
Software obfuscation techniques are increasingly being used to prevent attackers from
exploiting security flaws and launching successful attacks. With research on software …
exploiting security flaws and launching successful attacks. With research on software …
A novel graph-based approach for IoT botnet detection
Abstract The Internet of things (IoT) is the extension of Internet connectivity into physical
devices and everyday objects. These IoT devices can communicate with others over the …
devices and everyday objects. These IoT devices can communicate with others over the …
Hidden Markov models for malware classification
Previous research has shown that hidden Markov model (HMM) analysis is useful for
detecting certain challenging classes of malware. In this research, we consider the related …
detecting certain challenging classes of malware. In this research, we consider the related …
Scalable function call graph-based malware classification
In an attempt to preserve the structural information in malware binaries during feature
extraction, function call graph-based features have been used in various research works in …
extraction, function call graph-based features have been used in various research works in …
Convolutional neural networks and extreme learning machines for malware classification
M Jain, W Andreopoulos, M Stamp - Journal of Computer Virology and …, 2020 - Springer
Research in the field of malware classification often relies on machine learning models that
are trained on high-level features, such as opcodes, function calls, and control flow graphs …
are trained on high-level features, such as opcodes, function calls, and control flow graphs …
Evolution and detection of polymorphic and metamorphic malwares: A survey
Malwares are big threat to digital world and evolving with high complexity. It can penetrate
networks, steal confidential information from computers, bring down servers and can cripple …
networks, steal confidential information from computers, bring down servers and can cripple …
Evolution of malware and its detection techniques
In today's world, information is one of the most valuable assets, but there is a major threat to
it by the evolving second-generation sophisticated malware, because it can enter the …
it by the evolving second-generation sophisticated malware, because it can enter the …
[PDF][PDF] Network activity analysis of CryptoWall ransomware
The paper presents the analysis of the CryptoWall ransomware network behaviour. In this
approach a HoneyPot technology as well as the automatic run-time malware analytical …
approach a HoneyPot technology as well as the automatic run-time malware analytical …
[HTML][HTML] Sigma: A semantic integrated graph matching approach for identifying reused functions in binary code
The capability of efficiently recognizing reused functions for binary code is critical to many
digital forensics tasks, especially considering the fact that many modern malware typically …
digital forensics tasks, especially considering the fact that many modern malware typically …
Malware classification using static analysis based features
M Hassen, MM Carvalho… - 2017 IEEE symposium …, 2017 - ieeexplore.ieee.org
Anti-virus vendors receive hundreds of thousands of malware to be analysed each day.
Some are new malware while others are variations or evolutions of existing malware …
Some are new malware while others are variations or evolutions of existing malware …