Rebooting research on detecting repackaged android apps: Literature review and benchmark

L Li, TF Bissyandé, J Klein - IEEE Transactions on Software …, 2019 - ieeexplore.ieee.org
Repackaging is a serious threat to the Android ecosystem as it deprives app developers of
their benefits, contributes to spreading malware on users' devices, and increases the …

Detection of malicious PDF files and directions for enhancements: A state-of-the art survey

N Nissim, A Cohen, C Glezer, Y Elovici - Computers & Security, 2015 - Elsevier
Initial penetration is one of the first steps of an Advanced Persistent Threat (APT) attack, and
it is considered one of the most significant means of initiating cyber-attacks aimed at …

AVclass: A Tool for Massive Malware Labeling

M Sebastián, R Rivera, P Kotzias… - Research in Attacks …, 2016 - Springer
Labeling a malicious executable as a variant of a known family is important for security
applications such as triage, lineage, and for building reference datasets in turn used for …

Understanding linux malware

E Cozzi, M Graziano, Y Fratantonio… - 2018 IEEE symposium …, 2018 - ieeexplore.ieee.org
For the past two decades, the security community has been fighting malicious programs for
Windows-based operating systems. However, the recent surge in adoption of embedded …

BODMAS: An open dataset for learning based temporal analysis of PE malware

L Yang, A Ciptadi, I Laziuk… - 2021 IEEE Security …, 2021 - ieeexplore.ieee.org
We describe and release an open PE malware dataset called BODMAS to facilitate research
efforts in machine learning based malware analysis. By closely examining existing open PE …

Automatic analysis of malware behavior using machine learning

K Rieck, P Trinius, C Willems… - Journal of computer …, 2011 - content.iospress.com
Malicious software–so called malware–poses a major threat to the security of computer
systems. The amount and diversity of its variants render classic security defenses ineffective …

When malware is packin'heat; limits of machine learning classifiers based on static analysis features

H Aghakhani, F Gritti, F Mecca, M Lindorfer… - Network and …, 2020 - par.nsf.gov
Machine learning techniques are widely used in addition to signatures and heuristics to
increase the detection rate of anti-malware software, as they automate the creation of …

Opcode sequences as representation of executables for data-mining-based unknown malware detection

I Santos, F Brezo, X Ugarte-Pedrero, PG Bringas - information Sciences, 2013 - Elsevier
Malware can be defined as any type of malicious code that has the potential to harm a
computer or network. The volume of malware is growing faster every year and poses a …

AMAL: high-fidelity, behavior-based automated malware analysis and classification

A Mohaisen, O Alrawi, M Mohaisen - computers & security, 2015 - Elsevier
This paper introduces AMAL, an automated and behavior-based malware analysis and
labeling system that addresses shortcomings of the existing systems. AMAL consists of two …

Classifying malware represented as control flow graphs using deep graph convolutional neural network

J Yan, G Yan, D ** - 2019 49th annual IEEE/IFIP international …, 2019 - ieeexplore.ieee.org
Malware have been one of the biggest cyber threats in the digital world for a long time.
Existing machine learning based malware classification methods rely on handcrafted …