Dynamic malware analysis in the modern era—A state of the art survey

O Or-Meir, N Nissim, Y Elovici, L Rokach - ACM Computing Surveys …, 2019 - dl.acm.org
Although malicious software (malware) has been around since the early days of computers,
the sophistication and innovation of malware has increased over the years. In particular, the …

Malware detection with artificial intelligence: A systematic literature review

MG Gaber, M Ahmed, H Janicke - ACM Computing Surveys, 2024 - dl.acm.org
In this survey, we review the key developments in the field of malware detection using AI and
analyze core challenges. We systematically survey state-of-the-art methods across five …

When malware is packin'heat; limits of machine learning classifiers based on static analysis features

H Aghakhani, F Gritti, F Mecca, M Lindorfer… - … and Distributed System …, 2020 - hal.science
Machine learning techniques are widely used in addition to signatures and heuristics to
increase the detection rate of anti-malware software, as they automate the creation of …

A Systematical and longitudinal study of evasive behaviors in windows malware

N Galloro, M Polino, M Carminati, A Continella… - Computers & …, 2022 - Elsevier
Malware is one of the prevalent security threats. Sandboxes and, more generally,
instrumented environments play a crucial role in dynamically analyzing malware samples …

A survey on automated dynamic malware analysis evasion and counter-evasion: Pc, mobile, and web

A Bulazel, B Yener - Proceedings of the 1st Reversing and Offensive …, 2017 - dl.acm.org
Automated dynamic malware analysis systems are important in combating the proliferation
of modern malware. Unfortunately, malware can often easily detect and evade these …

Does every second count? time-based evolution of malware behavior in sandboxes

A Küchler, A Mantovani, Y Han, L Bilge… - NDSS 2021, Network …, 2021 - hal.science
The amount of time in which a sample is executed is one of the key parameters of a malware
analysis sandbox. Setting the threshold too high hinders the scalability and reduces the …

On the dissection of evasive malware

DC D'Elia, E Coppa, F Palmaro… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Complex malware samples feature measures to impede automatic and manual analyses,
making their investigation cumbersome. While automatic characterization of malware …

SoK: Using dynamic binary instrumentation for security (and how you may get caught red handed)

DC D'Elia, E Coppa, S Nicchi, F Palmaro… - Proceedings of the 2019 …, 2019 - dl.acm.org
Dynamic binary instrumentation (DBI) techniques allow for monitoring and possibly altering
the execution of a running program up to the instruction level granularity. The ease of use …

PackGenome: Automatically generating robust YARA rules for accurate malware packer detection

S Li, J Ming, P Qiu, Q Chen, L Liu, H Bao… - Proceedings of the …, 2023 - dl.acm.org
Binary packing, a widely-used program obfuscation style, compresses or encrypts the
original program and then recovers it at runtime. Packed malware samples are pervasive …

VMHunt: A verifiable approach to partially-virtualized binary code simplification

D Xu, J Ming, Y Fu, D Wu - Proceedings of the 2018 ACM SIGSAC …, 2018 - dl.acm.org
Code virtualization is a highly sophisticated obfuscation technique adopted by malware
authors to stay under the radar. However, the increasing complexity of code virtualization …