Metamorphic malware and obfuscation: a survey of techniques, variants, and generation kits

K Brezinski, K Ferens - Security and Communication Networks, 2023 - Wiley Online Library
The competing landscape between malware authors and security analysts is an ever‐
changing battlefield over who can innovate over the other. While security analysts are …

Characterizing malicious android apps by mining topic-specific data flow signatures

X Yang, D Lo, L Li, X **a, TF Bissyandé… - Information and Software …, 2017 - Elsevier
Abstract Context: State-of-the-art works on automated detection of Android malware have
leveraged app descriptions to spot anomalies wrt the functionality implemented, or have …

MSG: Missing-sequence generator for metamorphic malware detection

RK Koppanati, SK Peddoju - Journal of Information Security and …, 2025 - Elsevier
Metamorphic malware is a sophisticated malware that frequently modifies its code to avoid
being detected by signature-based methods while maintaining the same output during the …

Structural features with nonnegative matrix factorization for metamorphic malware detection

YT Ling, NFM Sani, MT Abdullah, NAWA Hamid - Computers & Security, 2021 - Elsevier
Metamorphic malware is well known for evading signature-based detection by exploiting
various code obfuscation techniques. Current metamorphic malware detection approaches …

Metamorphic malware detection using linear discriminant analysis and graph similarity

R Mirzazadeh, MH Moattar… - 2015 5th International …, 2015 - ieeexplore.ieee.org
The most common malware detection approaches which are based on signature matching
and are not sufficient for metamorphic malware detection, since virus kits and metamorphic …

Exploring the usage of topic modeling for android malware static analysis

E Medvet, F Mercaldo - 2016 11th International Conference on …, 2016 - ieeexplore.ieee.org
The rapid growth in smartphone and tablet usage over the last years has led to the
inevitable rise in targeting of these devices by cyber-criminals. The exponential growth of …

Proposing an HMM-based approach to detect metamorphic malware

M Gharacheh, V Derhami, S Hashemi… - 2015 4th Iranian Joint …, 2015 - ieeexplore.ieee.org
Previous research has shown that hidden Markov model (HMM) is a compelling option for
malware identification. However, some advanced metamorphic malware have proven to be …

[PDF][PDF] Detection of metamorphic malware based on hmm: A hierarchical approach

M Gharacheh, V Derhami, S Hashemi… - International Journal of …, 2016 - academia.edu
Markov model (HMM) is a persuasive option for malware detection. However, some
advanced metamorphic malware are able to overcome the traditional methods based on …

Evolutionary Based Transfer Learning Approach to Improving Classification of Metamorphic Malware

KO Babaagba, M Ayodele - International Conference on the Applications of …, 2023 - Springer
The proliferation of metamorphic malware has recently gained a lot of research interest. This
is because of their ability to transform their program codes stochastically. Several detectors …

Metamorphic virus detection using feature selection techniques

J Kuriakose, P Vinod - 2014 International Conference on …, 2014 - ieeexplore.ieee.org
In this article, a non-signature based statistical scanner for metamorphic malware detection,
employing feature ranking methods like Term Frequency-Inverse Document Frequency …