A survey on malware detection using data mining techniques

Y Ye, T Li, D Adjeroh, SS Iyengar - ACM Computing Surveys (CSUR), 2017 - dl.acm.org
In the Internet age, malware (such as viruses, trojans, ransomware, and bots) has posed
serious and evolving security threats to Internet users. To protect legitimate users from these …

A survey of protocol fuzzing

X Zhang, C Zhang, X Li, Z Du, B Mao, Y Li… - ACM Computing …, 2024 - dl.acm.org
Communication protocols form the bedrock of our interconnected world, yet vulnerabilities
within their implementations pose significant security threats. Recent developments have …

The art, science, and engineering of fuzzing: A survey

VJM Manès, HS Han, C Han, SK Cha… - IEEE Transactions …, 2019 - ieeexplore.ieee.org
Among the many software testing techniques available today, fuzzing has remained highly
popular due to its conceptual simplicity, its low barrier to deployment, and its vast amount of …

[PDF][PDF] Large language model guided protocol fuzzing

R Meng, M Mirchev, M Böhme… - Proceedings of the …, 2024 - ndss-symposium.org
How to find security flaws in a protocol implementation without a machine-readable
specification of the protocol? Facing the internet, protocol implementations are particularly …

AFLNet: a greybox fuzzer for network protocols

VT Pham, M Böhme… - 2020 IEEE 13th …, 2020 - ieeexplore.ieee.org
Server fuzzing is difficult. Unlike simple command-line tools, servers feature a massive state
space that can be traversed effectively only with well-defined sequences of input messages …

[PDF][PDF] AVATAR: A Framework to Support Dynamic Security Analysis of Embedded Systems' Firmwares.

J Zaddach, L Bruno, A Francillon, D Balzarotti - NDSS, 2014 - researchgate.net
To address the growing concerns about the security of embedded systems, it is important to
perform accurate analysis of firmware binaries, even when the source code or the hardware …

All you ever wanted to know about dynamic taint analysis and forward symbolic execution (but might have been afraid to ask)

EJ Schwartz, T Avgerinos… - 2010 IEEE symposium on …, 2010 - ieeexplore.ieee.org
Dynamic taint analysis and forward symbolic execution are quickly becoming staple
techniques in security analyses. Example applications of dynamic taint analysis and forward …

Program-adaptive mutational fuzzing

SK Cha, M Woo, D Brumley - 2015 IEEE Symposium on …, 2015 - ieeexplore.ieee.org
We present the design of an algorithm to maximize the number of bugs found for black-box
mutational fuzzing given a program and a seed input. The major intuition is to leverage white …

BitBlaze: A new approach to computer security via binary analysis

D Song, D Brumley, H Yin, J Caballero, I Jager… - … Systems Security: 4th …, 2008 - Springer
In this paper, we give an overview of the BitBlaze project, a new approach to computer
security via binary analysis. In particular, BitBlaze focuses on building a unified binary …

[PDF][PDF] Scalable, behavior-based malware clustering.

U Bayer, PM Comparetti, C Hlauschek, C Kruegel… - NDSS, 2009 - eurecom.eu
Anti-malware companies receive thousands of malware samples every day. To process this
large quantity, a number of automated analysis tools were developed. These tools execute a …