[PDF][PDF] Camouflage in malware: from encryption to metamorphism

BB Rad, M Masrom, S Ibrahim - International Journal of Computer …, 2012 - researchgate.net
Camouflage of malware is a serious challenge for antivirus experts and code analysts.
Malware use various techniques to camouflage them to not be easily visible and make their …

A Survey of strategy-driven evasion methods for PE malware: transformation, concealment, and attack

J Geng, J Wang, Z Fang, Y Zhou, D Wu, W Ge - Computers & Security, 2024 - Elsevier
The continuous proliferation of malware poses a formidable threat to the cyberspace
landscape. Researchers have proffered a multitude of sophisticated defense mechanisms …

Role of swarm and evolutionary algorithms for intrusion detection system: A survey

A Thakkar, R Lohiya - Swarm and evolutionary computation, 2020 - Elsevier
The growth of data and categories of attacks, demand the use of Intrusion Detection System
(IDS) effectively using Machine Learning (ML) and Deep Learning (DL) techniques. Apart …

KameleonFuzz: evolutionary fuzzing for black-box XSS detection

F Duchene, S Rawat, JL Richier, R Groz - … of the 4th ACM conference on …, 2014 - dl.acm.org
Fuzz testing consists in automatically generating and sending malicious inputs to an
application in order to hopefully trigger a vulnerability. Fuzzing entails such questions as …

Popularity-aware greedy dual-size web proxy caching algorithms

S **, A Bestavros - Proceedings 20th IEEE International …, 2000 - ieeexplore.ieee.org
Web caching aims at reducing network traffic, server load and user-perceived retrieval
delays by replicating popular content on proxy caches that are strategically placed within the …

On the use of artificial malicious patterns for android malware detection

M Jerbi, ZC Dagdia, S Bechikh, LB Said - Computers & Security, 2020 - Elsevier
Malware programs currently represent the most serious threat to computer information
systems. Despite the performed efforts of researchers in this field, detection tools still have …

Finding effective security strategies through reinforcement learning and self-play

K Hammar, R Stadler - 2020 16th International Conference on …, 2020 - ieeexplore.ieee.org
We present a method to automatically find security strategies for the use case of intrusion
prevention. Following this method, we model the interaction between an attacker and a …

Yamme: a yara-byte-signatures metamorphic mutation engine

A Coscia, V Dentamaro, S Galantucci… - IEEE Transactions …, 2023 - ieeexplore.ieee.org
Recognition of known malicious patterns through signature-based systems is unsuccessful
against malware for which no known signature exists to identify them. These include not only …

Android malware detection as a bi-level problem

M Jerbi, ZC Dagdia, S Bechikh, LB Said - Computers & Security, 2022 - Elsevier
Malware detection is still a very challenging topic in the cybersecurity field. This is mainly
due to the use of obfuscation techniques. To solve this issue, researchers proposed to …

Coevolution of mobile malware and anti-malware

S Sen, E Aydogan, AI Aysan - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
Mobile malware is one of today's greatest threats in computer security. Furthermore, new
mobile malware is emerging daily that introduces new security risks. However, while existing …