A survey on malware detection using data mining techniques

Y Ye, T Li, D Adjeroh, SS Iyengar - ACM Computing Surveys (CSUR), 2017 - dl.acm.org
In the Internet age, malware (such as viruses, trojans, ransomware, and bots) has posed
serious and evolving security threats to Internet users. To protect legitimate users from these …

Tight arms race: Overview of current malware threats and trends in their detection

L Caviglione, M Choraś, I Corona, A Janicki… - IEEE …, 2020 - ieeexplore.ieee.org
Cyber attacks are currently blooming, as the attackers reap significant profits from them and
face a limited risk when compared to committing the “classical” crimes. One of the major …

Kernel pooling for convolutional neural networks

Y Cui, F Zhou, J Wang, X Liu, Y Lin… - Proceedings of the …, 2017 - openaccess.thecvf.com
Abstract Convolutional Neural Networks (CNNs) with Bilinear Pooling, initially in their full
form and later using compact representations, have yielded impressive performance gains …

[HTML][HTML] The Ransomware-as-a-Service economy within the darknet

PH Meland, YFF Bayoumy, G Sindre - Computers & Security, 2020 - Elsevier
Ransomware is an epidemic that adversely affects the lives of both individuals and large
companies, where criminals demand payments to release infected digital assets. In the …

A survey on automated dynamic malware-analysis techniques and tools

M Egele, T Scholte, E Kirda, C Kruegel - ACM computing surveys (CSUR …, 2008 - dl.acm.org
Anti-virus vendors are confronted with a multitude of potentially malicious samples today.
Receiving thousands of new samples every day is not uncommon. The signatures that …

Detecting environment-sensitive malware

M Lindorfer, C Kolbitsch… - Recent Advances in …, 2011 - Springer
The execution of malware in an instrumented sandbox is a widespread approach for the
analysis of malicious code, largely because it sidesteps the difficulties involved in the static …

An analysis of underground forums

M Motoyama, D McCoy, K Levchenko… - Proceedings of the …, 2011 - dl.acm.org
Underground forums, where participants exchange information on abusive tactics and
engage in the sale of illegal goods and services, are a form of online social network (OSN) …

{ZOZZLE}: Fast and precise {In-Browser}{JavaScript} malware detection

C Curtsinger, B Livshits, B Zorn, C Seifert - 20th USENIX Security …, 2011 - usenix.org
JavaScript malware-based attacks account for a large fraction of successful mass-scale
exploitation happening today. Attackers like JavaScript-based attacks because they can be …

Click trajectories: End-to-end analysis of the spam value chain

K Levchenko, A Pitsillidis, N Chachra… - … ieee symposium on …, 2011 - ieeexplore.ieee.org
Spam-based advertising is a business. While it has engendered both widespread antipathy
and a multi-billion dollar anti-spam industry, it continues to exist because it fuels a profitable …

Nobody sells gold for the price of silver: Dishonesty, uncertainty and the underground economy

C Herley, D Florêncio - Economics of information security and privacy, 2010 - Springer
The underground economy has attracted a lot of attention recently as a key component of
cybercrime. In particular the IRC markets for stolen identities, phishing kits, botnets, and …