A comprehensive review on malware detection approaches
According to the recent studies, malicious software (malware) is increasing at an alarming
rate, and some malware can hide in the system by using different obfuscation techniques. In …
rate, and some malware can hide in the system by using different obfuscation techniques. In …
A survey on malware detection using data mining techniques
In the Internet age, malware (such as viruses, trojans, ransomware, and bots) has posed
serious and evolving security threats to Internet users. To protect legitimate users from these …
serious and evolving security threats to Internet users. To protect legitimate users from these …
Detection of malicious code variants based on deep learning
Z Cui, F Xue, X Cai, Y Cao, G Wang… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
With the development of the Internet, malicious code attacks have increased exponentially,
with malicious code variants ranking as a key threat to Internet security. The ability to detect …
with malicious code variants ranking as a key threat to Internet security. The ability to detect …
Droidcat: Effective android malware detection and categorization via app-level profiling
Most existing Android malware detection and categorization techniques are static
approaches, which suffer from evasion attacks, such as obfuscation. By analyzing program …
approaches, which suffer from evasion attacks, such as obfuscation. By analyzing program …
{UNVEIL}: A {Large-Scale}, automated approach to detecting ransomware
Although the concept of ransomware is not new (ie, such attacks date back at least as far as
the 1980s), this type of malware has recently experienced a resurgence in popularity. In fact …
the 1980s), this type of malware has recently experienced a resurgence in popularity. In fact …
Advanced persistent threats (apt): evolution, anatomy, attribution and countermeasures
A Sharma, BB Gupta, AK Singh… - Journal of Ambient …, 2023 - Springer
In today's cyber warfare realm, every stakeholder in cyberspace is becoming more potent by
developing advanced cyber weapons. They have equipped with the most advanced …
developing advanced cyber weapons. They have equipped with the most advanced …
Novel feature extraction, selection and fusion for effective malware family classification
Modern malware is designed with mutation characteristics, namely polymorphism and
metamorphism, which causes an enormous growth in the number of variants of malware …
metamorphism, which causes an enormous growth in the number of variants of malware …
Semantics-aware android malware classification using weighted contextual api dependency graphs
The drastic increase of Android malware has led to a strong interest in developing methods
to automate the malware analysis process. Existing automated Android malware detection …
to automate the malware analysis process. Existing automated Android malware detection …
Zero-day malware detection using transferred generative adversarial networks based on deep autoencoders
Detecting malicious software (malware) is important for computer security. Among the
different types of malware, zero-day malware is problematic because it cannot be removed …
different types of malware, zero-day malware is problematic because it cannot be removed …
50 ways to leak your data: An exploration of apps' circumvention of the android permissions system
J Reardon, Á Feal, P Wijesekera, AEB On… - 28th USENIX security …, 2019 - usenix.org
Modern smartphone platforms implement permission-based models to protect access to
sensitive data and system resources. However, apps can circumvent the permission model …
sensitive data and system resources. However, apps can circumvent the permission model …