A comprehensive review on malware detection approaches

ÖA Aslan, R Samet - IEEE access, 2020 - ieeexplore.ieee.org
According to the recent studies, malicious software (malware) is increasing at an alarming
rate, and some malware can hide in the system by using different obfuscation techniques. In …

A survey of binary code similarity

IU Haq, J Caballero - Acm computing surveys (csur), 2021 - dl.acm.org
Binary code similarityapproaches compare two or more pieces of binary code to identify their
similarities and differences. The ability to compare binary code enables many real-world …

AVclass: A Tool for Massive Malware Labeling

M Sebastián, R Rivera, P Kotzias… - Research in Attacks …, 2016 - Springer
Labeling a malicious executable as a variant of a known family is important for security
applications such as triage, lineage, and for building reference datasets in turn used for …

Detection of malicious web activity in enterprise computer networks

AM Oprea, Z Li, R Norris, KD Bowers - US Patent 9,838,407, 2017 - Google Patents
A processing device in one embodiment comprises a processor coupled to a memory and is
configured to obtain internal log data of a computer network of an enterprise, to extract …

Identifying encrypted malware traffic with contextual flow data

B Anderson, D McGrew - Proceedings of the 2016 ACM workshop on …, 2016 - dl.acm.org
Identifying threats contained within encrypted network traffic poses a unique set of
challenges. It is important to monitor this traffic for threats and malware, but do so in a way …

Machine learning based botnet detection using real-time extracted traffic features

S Ranjan - US Patent 8,682,812, 2014 - Google Patents
(57) ABSTRACT A method for identifying a botnet in a network, including analyzing historical
network data using a pre-determined heuristic to determine values of a feature in the …

Deciphering malware's use of TLS (without decryption)

B Anderson, S Paul, D McGrew - Journal of Computer Virology and …, 2018 - Springer
The use of TLS by malware poses new challenges to network threat detection because
traditional pattern-matching techniques can no longer be applied to its messages. However …

Detecting environment-sensitive malware

M Lindorfer, C Kolbitsch… - Recent Advances in …, 2011 - Springer
The execution of malware in an instrumented sandbox is a widespread approach for the
analysis of malicious code, largely because it sidesteps the difficulties involved in the static …

Packet-level signatures for smart home devices

R Trimananda, J Varmarken, A Markopoulou… - Network and …, 2020 - par.nsf.gov
mart home devices are vulnerable to passive inference attacks based on network traffic,
even in the presence of encryption. In this paper, we present PINGPONG, a tool that can …

[PDF][PDF] Building a dynamic reputation system for {DNS}

M Antonakakis, R Perdisci, D Dagon, W Lee… - 19th USENIX Security …, 2010 - usenix.org
Abstract The Domain Name System (DNS) is an essential protocol used by both legitimate
Internet applications and cyber attacks. For example, botnets rely on DNS to support agile …