A comprehensive review on malware detection approaches

ÖA Aslan, R Samet - IEEE access, 2020 - ieeexplore.ieee.org
According to the recent studies, malicious software (malware) is increasing at an alarming
rate, and some malware can hide in the system by using different obfuscation techniques. In …

A survey on malware detection using data mining techniques

Y Ye, T Li, D Adjeroh, SS Iyengar - ACM Computing Surveys (CSUR), 2017 - dl.acm.org
In the Internet age, malware (such as viruses, trojans, ransomware, and bots) has posed
serious and evolving security threats to Internet users. To protect legitimate users from these …

Detection of malicious code variants based on deep learning

Z Cui, F Xue, X Cai, Y Cao, G Wang… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
With the development of the Internet, malicious code attacks have increased exponentially,
with malicious code variants ranking as a key threat to Internet security. The ability to detect …

Droidcat: Effective android malware detection and categorization via app-level profiling

H Cai, N Meng, B Ryder, D Yao - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
Most existing Android malware detection and categorization techniques are static
approaches, which suffer from evasion attacks, such as obfuscation. By analyzing program …

{UNVEIL}: A {Large-Scale}, automated approach to detecting ransomware

A Kharaz, S Arshad, C Mulliner, W Robertson… - 25th USENIX security …, 2016 - usenix.org
Although the concept of ransomware is not new (ie, such attacks date back at least as far as
the 1980s), this type of malware has recently experienced a resurgence in popularity. In fact …

Advanced persistent threats (apt): evolution, anatomy, attribution and countermeasures

A Sharma, BB Gupta, AK Singh… - Journal of Ambient …, 2023 - Springer
In today's cyber warfare realm, every stakeholder in cyberspace is becoming more potent by
developing advanced cyber weapons. They have equipped with the most advanced …

Novel feature extraction, selection and fusion for effective malware family classification

M Ahmadi, D Ulyanov, S Semenov, M Trofimov… - Proceedings of the sixth …, 2016 - dl.acm.org
Modern malware is designed with mutation characteristics, namely polymorphism and
metamorphism, which causes an enormous growth in the number of variants of malware …

Semantics-aware android malware classification using weighted contextual api dependency graphs

M Zhang, Y Duan, H Yin, Z Zhao - … of the 2014 ACM SIGSAC conference …, 2014 - dl.acm.org
The drastic increase of Android malware has led to a strong interest in developing methods
to automate the malware analysis process. Existing automated Android malware detection …

Zero-day malware detection using transferred generative adversarial networks based on deep autoencoders

JY Kim, SJ Bu, SB Cho - Information Sciences, 2018 - Elsevier
Detecting malicious software (malware) is important for computer security. Among the
different types of malware, zero-day malware is problematic because it cannot be removed …

50 ways to leak your data: An exploration of apps' circumvention of the android permissions system

J Reardon, Á Feal, P Wijesekera, AEB On… - 28th USENIX security …, 2019 - usenix.org
Modern smartphone platforms implement permission-based models to protect access to
sensitive data and system resources. However, apps can circumvent the permission model …