A survey of adversarial attack and defense methods for malware classification in cyber security

S Yan, J Ren, W Wang, L Sun… - … Surveys & Tutorials, 2022 - ieeexplore.ieee.org
Malware poses a severe threat to cyber security. Attackers use malware to achieve their
malicious purposes, such as unauthorized access, stealing confidential data, blackmailing …

Tight arms race: Overview of current malware threats and trends in their detection

L Caviglione, M Choraś, I Corona, A Janicki… - IEEE …, 2020 - ieeexplore.ieee.org
Cyber attacks are currently blooming, as the attackers reap significant profits from them and
face a limited risk when compared to committing the “classical” crimes. One of the major …

Malware analysis by combining multiple detectors and observation windows

M Ficco - IEEE Transactions on Computers, 2021 - ieeexplore.ieee.org
Malware developers continually attempt to modify the execution pattern of malicious code
hiding it inside apparent normal applications, which makes its detection and classification …

A malware classification method based on memory dump grayscale image

Y Dai, H Li, Y Qian, X Lu - Digital Investigation, 2018 - Elsevier
Effective analysis of malware is of great significance in guaranteeing the reliability of the
system operation. Malware can easily escape from existing dynamic analysis methods …

Eddie: Em-based detection of deviations in program execution

A Nazari, N Sehatbakhsh, M Alam, A Zajic… - Proceedings of the 44th …, 2017 - dl.acm.org
This paper describes EM-Based Detection of Deviations in Program Execution (EDDIE), a
new method for detecting anomalies in program execution, such as malware and other code …

Hardware-assisted detection of firmware attacks in inverter-based cyberphysical microgrids

AP Kuruvila, I Zografopoulos, K Basu… - International Journal of …, 2021 - Elsevier
The electric grid modernization effort relies on the extensive deployment of microgrid (MG)
systems. MGs integrate renewable resources and energy storage systems, allowing to …

Power-based side-channel instruction-level disassembler

J Park, X Xu, Y Jin, D Forte, M Tehranipoor - Proceedings of the 55th …, 2018 - dl.acm.org
Modern embedded computing devices are vulnerable against malware and software piracy
due to insufficient security scrutiny and the complications of continuous patching. To detect …

CNN-based malware variants detection method for internet of things

Q Li, J Mi, W Li, J Wang… - IEEE Internet of Things …, 2021 - ieeexplore.ieee.org
Malware has become one of the most serious security threats to the Internet of Things (IoT).
Detection of malware variants can inhibit the spread of malicious code from the traditional …

RHMD: Evasion-resilient hardware malware detectors

KN Khasawneh, N Abu-Ghazaleh… - Proceedings of the 50th …, 2017 - dl.acm.org
Hardware Malware Detectors (HMDs) have recently been proposed as a defense against
the proliferation of malware. These detectors use low-level features, that can be collected by …

Malware detection in embedded systems using neural network model for electromagnetic side-channel signals

HA Khan, N Sehatbakhsh, LN Nguyen… - Journal of Hardware and …, 2019 - Springer
We propose a novel malware detection system for critical embedded and cyber-physical
systems (CPS). The system exploits electromagnetic (EM) side-channel signals from the …