A comprehensive review on malware detection approaches

ÖA Aslan, R Samet - IEEE access, 2020 - ieeexplore.ieee.org
According to the recent studies, malicious software (malware) is increasing at an alarming
rate, and some malware can hide in the system by using different obfuscation techniques. In …

A new malware classification framework based on deep learning algorithms

Ö Aslan, AA Yilmaz - Ieee Access, 2021 - ieeexplore.ieee.org
Recent technological developments in computer systems transfer human life from real to
virtual environments. Covid-19 disease has accelerated this process. Cyber criminals' …

Parallel Deep Learning with a hybrid BP-PSO framework for feature extraction and malware classification

MN Al-Andoli, SC Tan, KS Sim, CP Lim, PY Goh - Applied Soft Computing, 2022 - Elsevier
Malicious software (Malware) is a key threat to security of digital networks and systems.
While traditional machine learning methods have been widely used for malware detection …

A survey of practical formal methods for security

T Kulik, B Dongol, PG Larsen, HD Macedo… - Formal aspects of …, 2022 - dl.acm.org
In today's world, critical infrastructure is often controlled by computing systems. This
introduces new risks for cyber attacks, which can compromise the security and disrupt the …

An ensemble-based parallel deep learning classifier with PSO-BP optimization for malware detection

MN Al-Andoli, KS Sim, SC Tan, PY Goh, CP Lim - IEEE Access, 2023 - ieeexplore.ieee.org
Digital networks and systems are susceptible to malicious software (malware) attacks. Deep
learning (DL) models have recently emerged as effective methods to classify and detect …

Auto-detection of sophisticated malware using lazy-binding control flow graph and deep learning

MH Nguyen, D Le Nguyen, XM Nguyen, TT Quan - Computers & Security, 2018 - Elsevier
To date, industrial antivirus tools are mostly using signature-based methods to detect
malware occurrences. However, sophisticated malware, such as metamorphic or …

A framework for metamorphic malware analysis and real-time detection

S Alam, RN Horspool, I Traore, I Sogukpinar - computers & security, 2015 - Elsevier
Metamorphism is a technique that mutates the binary code using different obfuscations. It is
difficult to write a new metamorphic malware and in general malware writers reuse old …

Optimizing symbolic execution for malware behavior classification

S Sebastio, E Baranov, F Biondi, O Decourbe… - Computers & …, 2020 - Elsevier
Increasingly software correctness, reliability, and security is being analyzed using tools that
combine various formal and heuristic approaches. Often such analysis becomes expensive …

Proving nontermination via safety

HY Chen, B Cook, C Fuhs, K Nimkar… - … 2014, Held as Part of the …, 2014 - Springer
We show how the problem of nontermination proving can be reduced to a question of
underapproximation search guided by a safety prover. This reduction leads to new …

Efficient malware detection using model-checking

F Song, T Touili - International Symposium on Formal Methods, 2012 - Springer
Over the past decade, malware costs more than $10 billion every year and the cost is still
increasing. Classical signature-based and emulation-based methods are becoming …