[PDF][PDF] Camouflage in malware: from encryption to metamorphism
Camouflage of malware is a serious challenge for antivirus experts and code analysts.
Malware use various techniques to camouflage them to not be easily visible and make their …
Malware use various techniques to camouflage them to not be easily visible and make their …
A Survey of strategy-driven evasion methods for PE malware: transformation, concealment, and attack
The continuous proliferation of malware poses a formidable threat to the cyberspace
landscape. Researchers have proffered a multitude of sophisticated defense mechanisms …
landscape. Researchers have proffered a multitude of sophisticated defense mechanisms …
Role of swarm and evolutionary algorithms for intrusion detection system: A survey
The growth of data and categories of attacks, demand the use of Intrusion Detection System
(IDS) effectively using Machine Learning (ML) and Deep Learning (DL) techniques. Apart …
(IDS) effectively using Machine Learning (ML) and Deep Learning (DL) techniques. Apart …
KameleonFuzz: evolutionary fuzzing for black-box XSS detection
Fuzz testing consists in automatically generating and sending malicious inputs to an
application in order to hopefully trigger a vulnerability. Fuzzing entails such questions as …
application in order to hopefully trigger a vulnerability. Fuzzing entails such questions as …
Popularity-aware greedy dual-size web proxy caching algorithms
S **, A Bestavros - Proceedings 20th IEEE International …, 2000 - ieeexplore.ieee.org
Web caching aims at reducing network traffic, server load and user-perceived retrieval
delays by replicating popular content on proxy caches that are strategically placed within the …
delays by replicating popular content on proxy caches that are strategically placed within the …
On the use of artificial malicious patterns for android malware detection
Malware programs currently represent the most serious threat to computer information
systems. Despite the performed efforts of researchers in this field, detection tools still have …
systems. Despite the performed efforts of researchers in this field, detection tools still have …
Finding effective security strategies through reinforcement learning and self-play
We present a method to automatically find security strategies for the use case of intrusion
prevention. Following this method, we model the interaction between an attacker and a …
prevention. Following this method, we model the interaction between an attacker and a …
Yamme: a yara-byte-signatures metamorphic mutation engine
Recognition of known malicious patterns through signature-based systems is unsuccessful
against malware for which no known signature exists to identify them. These include not only …
against malware for which no known signature exists to identify them. These include not only …
Android malware detection as a bi-level problem
Malware detection is still a very challenging topic in the cybersecurity field. This is mainly
due to the use of obfuscation techniques. To solve this issue, researchers proposed to …
due to the use of obfuscation techniques. To solve this issue, researchers proposed to …
Coevolution of mobile malware and anti-malware
Mobile malware is one of today's greatest threats in computer security. Furthermore, new
mobile malware is emerging daily that introduces new security risks. However, while existing …
mobile malware is emerging daily that introduces new security risks. However, while existing …