Dynamic malware analysis in the modern era—A state of the art survey

O Or-Meir, N Nissim, Y Elovici, L Rokach - ACM Computing Surveys …, 2019 - dl.acm.org
Although malicious software (malware) has been around since the early days of computers,
the sophistication and innovation of malware has increased over the years. In particular, the …

Malware dynamic analysis evasion techniques: A survey

A Afianian, S Niksefat, B Sadeghiyan… - ACM Computing Surveys …, 2019 - dl.acm.org
The cyber world is plagued with ever-evolving malware that readily infiltrate all defense
mechanisms, operate viciously unbeknownst to the user, and surreptitiously exfiltrate …

MtNet: a multi-task neural network for dynamic malware classification

W Huang, JW Stokes - Detection of Intrusions and Malware, and …, 2016 - Springer
In this paper, we propose a new multi-task, deep learning architecture for malware
classification for the binary (ie malware versus benign) malware classification task. All …

{DroidScope}: Seamlessly reconstructing the {OS} and dalvik semantic views for dynamic android malware analysis

LK Yan, H Yin - 21st USENIX security symposium (USENIX security 12), 2012 - usenix.org
The prevalence of mobile platforms, the large market share of Android, plus the openness of
the Android Market makes it a hot target for malware attacks. Once a malware sample has …

Detecting environment-sensitive malware

M Lindorfer, C Kolbitsch… - Recent Advances in …, 2011 - Springer
The execution of malware in an instrumented sandbox is a widespread approach for the
analysis of malicious code, largely because it sidesteps the difficulties involved in the static …

{BareCloud}: Bare-metal analysis-based evasive malware detection

D Kirat, G Vigna, C Kruegel - 23rd USENIX Security Symposium …, 2014 - usenix.org
The volume and the sophistication of malware are continuously increasing and evolving.
Automated dynamic malware analysis is a widely-adopted approach for detecting malicious …

Scalability, fidelity and stealth in the DRAKVUF dynamic malware analysis system

TK Lengyel, S Maresca, BD Payne… - Proceedings of the 30th …, 2014 - dl.acm.org
Malware is one of the biggest security threats on the Internet today and deploying effective
defensive solutions requires the rapid analysis of a continuously increasing number of …

Prudent practices for designing malware experiments: Status quo and outlook

C Rossow, CJ Dietrich, C Grier… - … IEEE symposium on …, 2012 - ieeexplore.ieee.org
Malware researchers rely on the observation of malicious code in execution to collect
datasets for a wide array of experiments, including generation of detection models, study of …

A survey on automated dynamic malware analysis evasion and counter-evasion: Pc, mobile, and web

A Bulazel, B Yener - Proceedings of the 1st Reversing and Offensive …, 2017 - dl.acm.org
Automated dynamic malware analysis systems are important in combating the proliferation
of modern malware. Unfortunately, malware can often easily detect and evade these …

Spotless sandboxes: Evading malware analysis systems using wear-and-tear artifacts

N Miramirkhani, MP Appini, N Nikiforakis… - … IEEE Symposium on …, 2017 - ieeexplore.ieee.org
Malware sandboxes, widely used by antivirus companies, mobile application marketplaces,
threat detection appliances, and security researchers, face the challenge of environment …