Learning from big malwares

L Song, H Huang, W Zhou, W Wu, Y Zhang - Proceedings of the 7th …, 2016 - dl.acm.org
This paper calls for the attention to investigate real-world malwares in large scales by
examining the largest real malware repository, VirusTotal. As a first step, we analyzed two …

The cause of all evils: Assessing causality between user actions and malware activity

E Mariconti, J Onaolapo, G Ross… - 10th USENIX Workshop …, 2017 - usenix.org
Malware samples are created at a pace that makes it difficult for analysis to keep up. When
analyzing an unknown malware sample, it is important to assess its capabilities to determine …

Malware biodiversity using static analysis

JD Seideman, B Khan, AC Vargas - International Conference on Future …, 2015 - Springer
Malware is constantly changing and is released very rapidly, necessarily to remain effective
in the changing computer landscape. Some malware files can be related to each other; …

Lines of malicious code: Insights into the malicious software industry

M Lindorfer, A Di Federico, F Maggi… - Proceedings of the 28th …, 2012 - dl.acm.org
Malicious software installed on infected computers is a fundamental component of online
crime. Malware development thus plays an essential role in the underground economy of …

Analyzing and exploiting network behaviors of malware

JA Morales, A Al-Bataineh, S Xu, R Sandhu - Security and Privacy in …, 2010 - Springer
In this paper we address the following questions: From a networking perspective, do
malicious programs (malware, bots, viruses, etc...) behave differently from benign programs …

A close look at a daily dataset of malware samples

X Ugarte-Pedrero, M Graziano… - ACM Transactions on …, 2019 - dl.acm.org
The number of unique malware samples is growing out of control. Over the years, security
companies have designed and deployed complex infrastructures to collect and analyze this …

A comparison of the classification of disparate malware collected in different time periods

MDR Islam, R Tian, V Moonsamy… - Journal of …, 2012 - researchoutput.csu.edu.au
It has been argued that an anti-virus strategy based on malware collected at a certain date,
will not work at a later date because malware evolves rapidly and an anti-virus engine is …

[PDF][PDF] Measuring the speed of the Red Queen's Race

R Harang, FN Ducau - BlackHat: Las Vegas, NV, USA, 2018 - i.blackhat.com
Security is a constant cat-and-mouse game between those trying to keep abreast of and
detect novel malware, and the malware authors attempting to evade detection. The …

Mcboost: Boosting scalability in malware collection and analysis using statistical classification of executables

R Perdisci, A Lanzi, W Lee - 2008 Annual Computer Security …, 2008 - ieeexplore.ieee.org
In this work, we propose Malware Collection Booster (McBoost), a fast statistical malware
detection tool that is intended to improve the scalability of existing malware collection and …

Forecast: skimming off the malware cream

M Neugschwandtner, PM Comparetti, G Jacob… - Proceedings of the 27th …, 2011 - dl.acm.org
To handle the large number of malware samples appearing in the wild each day, security
analysts and vendors employ automated tools to detect, classify and analyze malicious …