A Survey of strategy-driven evasion methods for PE malware: transformation, concealment, and attack

J Geng, J Wang, Z Fang, Y Zhou, D Wu, W Ge - Computers & Security, 2024 - Elsevier
The continuous proliferation of malware poses a formidable threat to the cyberspace
landscape. Researchers have proffered a multitude of sophisticated defense mechanisms …

Enhancing malware analysis sandboxes with emulated user behavior

S Liu, P Feng, S Wang, K Sun, J Cao - Computers & Security, 2022 - Elsevier
Cybersecurity teams have widely used malware analysis sandboxes to investigate the threat
of malware. Correspondingly, armored malware adopts various anti-sandbox techniques to …

Exploring how regulators face platform business issues in the lifecycle stages: Evidence of iranian ride-hailing platform business

J Soltanzadeh, K Blind, M Elyasi - Telecommunications Policy, 2023 - Elsevier
Abstract The emergence of Platform Businesses (PBs) has caused a conflict between the
traditional and new economic actors. Furthermore, it has escalated to government bodies …

See through walls: Detecting malware in sgx enclaves with sgx-bouncer

Z Zhang, X Zhang, Q Li, K Sun, Y Zhang, S Liu… - Proceedings of the …, 2021 - dl.acm.org
Intel Software Guard Extensions (SGX) offers strong confidentiality and integrity protection to
software programs running in untrusted operating systems. Unfortunately, SGX may be …

[PDF][PDF] Design and implementation of a collaborative lightweight malware analysis sandbox using container virtualization

R Mogicato, A Zermin - Universität Zürich, Zürich, Switzerland, Tech …, 2023 - files.ifi.uzh.ch
Malware as an attack vector for cyber-physical systems has remained a relevant security
threat, thus the development of novel analysis approaches and the generation of relevant …

[PDF][PDF] Defeating anti-debugging techniques for malware analysis using a debugger

JW Kim, J Bang, MJ Choi - Advances in Science …, 2020 - pdfs.semanticscholar.org
Cyberattacks such as spear phishing and malspam pretending to be companies, institutes,
and government officials are increasing and evolving. Malware has a variety of purposes …

Envfaker: A method to reinforce linux sandbox based on tracer, filter and emulator against environmental-sensitive malware

C **e, Y Guo, S Shi, Y Sheng, X Chen… - 2021 IEEE 20th …, 2021 - ieeexplore.ieee.org
Sandbox is an excellent tool for dynamic malware analysis. However, the sandbox detection
techniques are increasingly adopted to develop malwares, which has been a significant …

Role of Logistic Regression in Malware Detection: A Systematic Literature Review

MS Farooq, Z Akram, A Alvi, U Omer - VFAST Transactions on Software …, 2022 - vfast.org
When brain, the first virus known introduced in computer systems, requirement of security
was raised. Malware Detection turn out to be more vital when network is used for transferring …

Datascience in support of cybersecurity operations: Adaptable, robust and explainable anomaly detection for security analysts

A Dey - 2022 - theses.hal.science
To defend against sophisticated cyber-criminal organizations and APTs, IT system operators
should define and enforce strict security policies. However, defining and maintining perfect …

Realistic simulation of users for IT systems in cyber ranges

A Dey, B Costé, É Totel, A Bécue - arxiv preprint arxiv:2111.11785, 2021 - arxiv.org
Generating user activity is a key capability for both evaluating security monitoring tools as
well as improving the credibility of attacker analysis platforms (eg, honeynets). In this paper …