[HTML][HTML] The rise of machine learning for detection and classification of malware: Research developments, trends and challenges

D Gibert, C Mateu, J Planes - Journal of Network and Computer …, 2020 - Elsevier
The struggle between security analysts and malware developers is a never-ending battle
with the complexity of malware changing as quickly as innovation grows. Current state-of-the …

A survey on malware detection using data mining techniques

Y Ye, T Li, D Adjeroh, SS Iyengar - ACM Computing Surveys (CSUR), 2017 - dl.acm.org
In the Internet age, malware (such as viruses, trojans, ransomware, and bots) has posed
serious and evolving security threats to Internet users. To protect legitimate users from these …

Deep neural network based malware detection using two dimensional binary program features

J Saxe, K Berlin - 2015 10th international conference on …, 2015 - ieeexplore.ieee.org
In this paper we introduce a deep neural network based malware detection system that
Invincea has developed, which achieves a usable detection rate at an extremely low false …

Survey of machine learning techniques for malware analysis

D Ucci, L Aniello, R Baldoni - Computers & Security, 2019 - Elsevier
Co** with malware is getting more and more challenging, given their relentless growth in
complexity and volume. One of the most common approaches in literature is using machine …

Image-Based malware classification using ensemble of CNN architectures (IMCEC)

D Vasan, M Alazab, S Wassan, B Safaei, Q Zheng - Computers & Security, 2020 - Elsevier
Both researchers and malware authors have demonstrated that malware scanners are
unfortunately limited and are easily evaded by simple obfuscation techniques. This paper …

Deep learning for classification of malware system call sequences

B Kolosnjaji, A Zarras, G Webster, C Eckert - AI 2016: Advances in …, 2016 - Springer
The increase in number and variety of malware samples amplifies the need for improvement
in automatic detection and classification of the malware variants. Machine learning is a …

An empirical comparison of botnet detection methods

S Garcia, M Grill, J Stiborek, A Zunino - computers & security, 2014 - Elsevier
The results of botnet detection methods are usually presented without any comparison.
Although it is generally accepted that more comparisons with third-party methods may help …

AVclass: A Tool for Massive Malware Labeling

M Sebastián, R Rivera, P Kotzias… - Research in Attacks …, 2016 - Springer
Labeling a malicious executable as a variant of a known family is important for security
applications such as triage, lineage, and for building reference datasets in turn used for …

All you ever wanted to know about dynamic taint analysis and forward symbolic execution (but might have been afraid to ask)

EJ Schwartz, T Avgerinos… - 2010 IEEE symposium on …, 2010 - ieeexplore.ieee.org
Dynamic taint analysis and forward symbolic execution are quickly becoming staple
techniques in security analyses. Example applications of dynamic taint analysis and forward …

A survey on automated dynamic malware-analysis techniques and tools

M Egele, T Scholte, E Kirda, C Kruegel - ACM computing surveys (CSUR …, 2008 - dl.acm.org
Anti-virus vendors are confronted with a multitude of potentially malicious samples today.
Receiving thousands of new samples every day is not uncommon. The signatures that …