Survey of machine learning techniques for malware analysis
Co** with malware is getting more and more challenging, given their relentless growth in
complexity and volume. One of the most common approaches in literature is using machine …
complexity and volume. One of the most common approaches in literature is using machine …
A survey of adversarial attack and defense methods for malware classification in cyber security
Malware poses a severe threat to cyber security. Attackers use malware to achieve their
malicious purposes, such as unauthorized access, stealing confidential data, blackmailing …
malicious purposes, such as unauthorized access, stealing confidential data, blackmailing …
A novel deep framework for dynamic malware detection based on API sequence intrinsic features
Dynamic malware detection executes the software in a secured virtual environment and
monitors its run-time behavior. This technique widely uses API sequence analysis to identify …
monitors its run-time behavior. This technique widely uses API sequence analysis to identify …
Malware dynamic analysis evasion techniques: A survey
The cyber world is plagued with ever-evolving malware that readily infiltrate all defense
mechanisms, operate viciously unbeknownst to the user, and surreptitiously exfiltrate …
mechanisms, operate viciously unbeknownst to the user, and surreptitiously exfiltrate …
Tight arms race: Overview of current malware threats and trends in their detection
Cyber attacks are currently blooming, as the attackers reap significant profits from them and
face a limited risk when compared to committing the “classical” crimes. One of the major …
face a limited risk when compared to committing the “classical” crimes. One of the major …
A survey of strategy-driven evasion methods for PE malware: Transformation, concealment, and attack
The continuous proliferation of malware poses a formidable threat to the cyberspace
landscape. Researchers have proffered a multitude of sophisticated defense mechanisms …
landscape. Researchers have proffered a multitude of sophisticated defense mechanisms …
Orchestration of APT malware evasive manoeuvers employed for eluding anti-virus and sandbox defense
A Sharma, BB Gupta, AK Singh, VK Saraswat - Computers & Security, 2022 - Elsevier
The modern day cyber attacks are highly targeted and incorporate advanced tactics,
techniques and procedures for greater stealth, impact and success. These attacks are also …
techniques and procedures for greater stealth, impact and success. These attacks are also …
Identifying authorship in malicious binaries: Features, challenges & datasets
J Gray, D Sgandurra, L Cavallaro… - ACM Computing …, 2024 - dl.acm.org
Attributing a piece of malware to its creator typically requires threat intelligence. Binary
attribution increases the level of difficulty as it mostly relies upon the ability to disassemble …
attribution increases the level of difficulty as it mostly relies upon the ability to disassemble …
A Systematical and longitudinal study of evasive behaviors in windows malware
Malware is one of the prevalent security threats. Sandboxes and, more generally,
instrumented environments play a crucial role in dynamically analyzing malware samples …
instrumented environments play a crucial role in dynamically analyzing malware samples …
A survey on automated dynamic malware analysis evasion and counter-evasion: Pc, mobile, and web
Automated dynamic malware analysis systems are important in combating the proliferation
of modern malware. Unfortunately, malware can often easily detect and evade these …
of modern malware. Unfortunately, malware can often easily detect and evade these …