An inside look into the practice of malware analysis

M Yong Wong, M Landen, M Antonakakis… - Proceedings of the …, 2021 - dl.acm.org
Malware analysis aims to understand how malicious software carries out actions necessary
for a successful attack and identify the possible impacts of the attack. While there has been …

Firma: Malware clustering and network signature generation with mixed network behaviors

MZ Rafique, J Caballero - Research in Attacks, Intrusions, and Defenses …, 2013 - Springer
The ever-increasing number of malware families and polymorphic variants creates a
pressing need for automatic tools to cluster the collected malware into families and generate …

A survey of machine learning methods and challenges for windows malware classification

E Raff, C Nicholas - arxiv preprint arxiv:2006.09271, 2020 - arxiv.org
Malware classification is a difficult problem, to which machine learning methods have been
applied for decades. Yet progress has often been slow, in part due to a number of unique …

Challenges and pitfalls in malware research

M Botacin, F Ceschin, R Sun, D Oliveira, A Grégio - Computers & Security, 2021 - Elsevier
As the malware research field became more established over the last two decades, new
research questions arose, such as how to make malware research reproducible, how to …

A comparison of machine learning approaches to detect botnet traffic

B Abraham, A Mandya, R Bapat, F Alali… - … Joint Conference on …, 2018 - ieeexplore.ieee.org
During the past decade, botnets have become one of the most significant threats in the field
of network security. A botnet attack typically works by infecting a device with malware and …

Discovering similar malware samples using API call topics

A Fu**o, J Murakami, T Mori - 2015 12th annual IEEE …, 2015 - ieeexplore.ieee.org
To automate malware analysis, dynamic malware analysis systems have attracted
increasing attention from both the industry and research communities. Of the various logs …

GoldenEye: Efficiently and Effectively Unveiling Malware's Targeted Environment

Z Xu, J Zhang, G Gu, Z Lin - Research in Attacks, Intrusions and Defenses …, 2014 - Springer
A critical challenge when combating malware threat is how to efficiently and effectively
identify the targeted victim's environment, given an unknown malware sample …

Reliable and trustworthy memory acquisition on smartphones

H Sun, K Sun, Y Wang, J **g - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
With the wide usage of smartphones in our daily life, new malware is emerging to
compromise the mobile OS and then steal or manipulate sensitive data from mobile …

Assurance of security rules in a network

A Dixit, N Yadav, N Sharma, RR Kompella… - US Patent …, 2022 - Google Patents
(Continued) Primary Examiner Kari L Schmidt (74) Attorney, Agent, or Firm-Polsinelli PC
(57) ABSTRACT Systems, methods, and computer-readable media for assur ance of rules in …

Towards the detection of isolation-aware malware

RJ Rodriguez, IR Gaston… - IEEE Latin America …, 2016 - ieeexplore.ieee.org
Malware analysis tools have evolved in the last years providing tightly controlled sandbox
and virtualised environments where malware is analysed minimising potential harmful …