Metamorphic malware and obfuscation: a survey of techniques, variants, and generation kits

K Brezinski, K Ferens - Security and Communication Networks, 2023 - Wiley Online Library
The competing landscape between malware authors and security analysts is an ever‐
changing battlefield over who can innovate over the other. While security analysts are …

A comparison of static, dynamic, and hybrid analysis for malware detection

A Damodaran, FD Troia, CA Visaggio… - Journal of Computer …, 2017 - Springer
In this research, we compare malware detection techniques based on static, dynamic, and
hybrid analysis. Specifically, we train Hidden Markov Models (HMMs) on both static and …

Similarity-based Android malware detection using Hamming distance of static binary features

R Taheri, M Ghahramani, R Javidan, M Shojafar… - Future Generation …, 2020 - Elsevier
In this paper, we develop four malware detection methods using Hamming distance to find
similarity between samples which are first nearest neighbors (FNN), all nearest neighbors …

[LIBRO][B] Introduction to machine learning with applications in information security

M Stamp - 2022 - taylorfrancis.com
Introduction to Machine Learning with Applications in Information Security, Second Edition
provides a classroom-tested introduction to a wide variety of machine learning and deep …

Transfer learning for image-based malware classification

N Bhodia, P Prajapati, F Di Troia, M Stamp - arxiv preprint arxiv …, 2019 - arxiv.org
In this paper, we consider the problem of malware detection and classification based on
image analysis. We convert executable files to images and apply image recognition using …

Recent development in face recognition

U Jayaraman, P Gupta, S Gupta, G Arora, K Tiwari - Neurocomputing, 2020 - Elsevier
Face stands out as a preferable biometric trait for automatic human authentication as it is
intuitive and non-intrusive. This paper investigates various feature-based automatic face …

Graph embedding as a new approach for unknown malware detection

H Hashemi, A Azmoodeh, A Hamzeh… - Journal of Computer …, 2017 - Springer
Malware is any type of computer program which is developed to harm computers, networks,
and information. Noticeable growth of malware development has made computer and …

An empirical analysis of image-based learning techniques for malware classification

P Prajapati, M Stamp - Malware analysis using artificial intelligence and …, 2021 - Springer
In this chapter, we consider malware classification using deep learning techniques and
image-based features. We employ a wide variety of deep learning techniques, including …

FOSSIL A Resilient and Efficient System for Identifying FOSS Functions in Malware Binaries

S Alrabaee, P Shirani, L Wang, M Debbabi - ACM Transactions on …, 2018 - dl.acm.org
Identifying free open-source software (FOSS) packages on binaries when the source code is
unavailable is important for many security applications, such as malware detection, software …

A framework for metamorphic malware analysis and real-time detection

S Alam, RN Horspool, I Traore, I Sogukpinar - computers & security, 2015 - Elsevier
Metamorphism is a technique that mutates the binary code using different obfuscations. It is
difficult to write a new metamorphic malware and in general malware writers reuse old …