Malware dynamic analysis evasion techniques: A survey

A Afianian, S Niksefat, B Sadeghiyan… - ACM Computing Surveys …, 2019 - dl.acm.org
The cyber world is plagued with ever-evolving malware that readily infiltrate all defense
mechanisms, operate viciously unbeknownst to the user, and surreptitiously exfiltrate …

A survey on automated dynamic malware-analysis techniques and tools

M Egele, T Scholte, E Kirda, C Kruegel - ACM computing surveys (CSUR …, 2008 - dl.acm.org
Anti-virus vendors are confronted with a multitude of potentially malicious samples today.
Receiving thousands of new samples every day is not uncommon. The signatures that …

Malware detection by eating a whole exe

E Raff, J Barker, J Sylvester, R Brandon… - arxiv preprint arxiv …, 2017 - arxiv.org
In this work we introduce malware detection from raw byte sequences as a fruitful research
area to the larger machine learning community. Building a neural network for such a …

A survey of microarchitectural timing attacks and countermeasures on contemporary hardware

Q Ge, Y Yarom, D Cock, G Heiser - Journal of Cryptographic Engineering, 2018 - Springer
Microarchitectural timing channels expose hidden hardware states though timing. We survey
recent attacks that exploit microarchitectural features in shared hardware, especially as they …

When malware is packin'heat; limits of machine learning classifiers based on static analysis features

H Aghakhani, F Gritti, F Mecca, M Lindorfer… - … and Distributed System …, 2020 - hal.science
Machine learning techniques are widely used in addition to signatures and heuristics to
increase the detection rate of anti-malware software, as they automate the creation of …

Detecting environment-sensitive malware

M Lindorfer, C Kolbitsch… - Recent Advances in …, 2011 - Springer
The execution of malware in an instrumented sandbox is a widespread approach for the
analysis of malicious code, largely because it sidesteps the difficulties involved in the static …

BotSniffer: Detecting botnet command and control channels in network traffic

G Gu, J Zhang, W Lee - 2008 - corescholar.libraries.wright.edu
Botnets are now recognized as one of the most serious security threats. In contrast to
previous malware, botnets have the characteristic of a command and control (C&C) channel …

Methods, systems, and media for detecting covert malware

BM Bowen, PV Prabhu, VP Kemerlis… - US Patent …, 2013 - Google Patents
Methods, systems, and media for detecting covert malware are provided. In accordance with
some embodiments, a method for detecting covert malware in a computing environ ment is …

{BareCloud}: Bare-metal analysis-based evasive malware detection

D Kirat, G Vigna, C Kruegel - 23rd USENIX Security Symposium …, 2014 - usenix.org
The volume and the sophistication of malware are continuously increasing and evolving.
Automated dynamic malware analysis is a widely-adopted approach for detecting malicious …

Methods, systems, and media for baiting inside attackers

SJ Stolfo, AD Keromytis, BM Bowen… - US Patent …, 2015 - Google Patents
2009-12-05 Assigned to THE TRUSTEES OF COLUMBIA UNIVERSITY IN THE CITY OF
NEW YORK reassignment THE TRUSTEES OF COLUMBIA UNIVERSITY IN THE CITY OF …