Metamorphic malware and obfuscation: a survey of techniques, variants, and generation kits
K Brezinski, K Ferens - Security and Communication Networks, 2023 - Wiley Online Library
The competing landscape between malware authors and security analysts is an ever‐
changing battlefield over who can innovate over the other. While security analysts are …
changing battlefield over who can innovate over the other. While security analysts are …
A comparison of static, dynamic, and hybrid analysis for malware detection
A Damodaran, FD Troia, CA Visaggio… - Journal of Computer …, 2017 - Springer
In this research, we compare malware detection techniques based on static, dynamic, and
hybrid analysis. Specifically, we train Hidden Markov Models (HMMs) on both static and …
hybrid analysis. Specifically, we train Hidden Markov Models (HMMs) on both static and …
Similarity-based Android malware detection using Hamming distance of static binary features
In this paper, we develop four malware detection methods using Hamming distance to find
similarity between samples which are first nearest neighbors (FNN), all nearest neighbors …
similarity between samples which are first nearest neighbors (FNN), all nearest neighbors …
[LIBRO][B] Introduction to machine learning with applications in information security
M Stamp - 2022 - taylorfrancis.com
Introduction to Machine Learning with Applications in Information Security, Second Edition
provides a classroom-tested introduction to a wide variety of machine learning and deep …
provides a classroom-tested introduction to a wide variety of machine learning and deep …
Transfer learning for image-based malware classification
In this paper, we consider the problem of malware detection and classification based on
image analysis. We convert executable files to images and apply image recognition using …
image analysis. We convert executable files to images and apply image recognition using …
Recent development in face recognition
Face stands out as a preferable biometric trait for automatic human authentication as it is
intuitive and non-intrusive. This paper investigates various feature-based automatic face …
intuitive and non-intrusive. This paper investigates various feature-based automatic face …
Graph embedding as a new approach for unknown malware detection
Malware is any type of computer program which is developed to harm computers, networks,
and information. Noticeable growth of malware development has made computer and …
and information. Noticeable growth of malware development has made computer and …
An empirical analysis of image-based learning techniques for malware classification
P Prajapati, M Stamp - Malware analysis using artificial intelligence and …, 2021 - Springer
In this chapter, we consider malware classification using deep learning techniques and
image-based features. We employ a wide variety of deep learning techniques, including …
image-based features. We employ a wide variety of deep learning techniques, including …
FOSSIL A Resilient and Efficient System for Identifying FOSS Functions in Malware Binaries
Identifying free open-source software (FOSS) packages on binaries when the source code is
unavailable is important for many security applications, such as malware detection, software …
unavailable is important for many security applications, such as malware detection, software …
A framework for metamorphic malware analysis and real-time detection
Metamorphism is a technique that mutates the binary code using different obfuscations. It is
difficult to write a new metamorphic malware and in general malware writers reuse old …
difficult to write a new metamorphic malware and in general malware writers reuse old …