Malware-aware processors: A framework for efficient online malware detection

M Ozsoy, C Donovick, I Gorelik… - 2015 IEEE 21st …, 2015 - ieeexplore.ieee.org
Security exploits and ensuant malware pose an increasing challenge to computing systems
as the variety and complexity of attacks continue to increase. In response, software-based …

Testing malware detectors

M Christodorescu, S Jha - ACM SIGSOFT Software Engineering Notes, 2004 - dl.acm.org
In today's interconnected world, malware, such as worms and viruses, can cause havoc. A
malware detector (commonly known as virus scanner) attempts to identify malware. In spite …

An intelligent PE-malware detection system based on association mining

Y Ye, D Wang, T Li, D Ye, Q Jiang - Journal in computer virology, 2008 - Springer
The proliferation of malware has presented a serious threat to the security of computer
systems. Traditional signature-based anti-virus systems fail to detect polymorphic …

Towards understanding malware behaviour by the extraction of API calls

M Alazab, S Venkataraman… - 2010 second cybercrime …, 2010 - ieeexplore.ieee.org
One of the recent trends adopted by malware authors is to use packers or software tools that
instigate code obfuscation in order to evade detection by antivirus scanners. With evasion …

Eddie: Em-based detection of deviations in program execution

A Nazari, N Sehatbakhsh, M Alam, A Zajic… - Proceedings of the 44th …, 2017 - dl.acm.org
This paper describes EM-Based Detection of Deviations in Program Execution (EDDIE), a
new method for detecting anomalies in program execution, such as malware and other code …

Malicious web content detection by machine learning

YT Hou, Y Chang, T Chen, CS Laih… - expert systems with …, 2010 - Elsevier
The recent development of the dynamic HTML gives attackers a new and powerful
technique to compromise computer systems. A malicious dynamic HTML code is usually …

Effective one-class classifier model for memory dump malware detection

M Al-Qudah, Z Ashi, M Alnabhan… - Journal of Sensor and …, 2023 - mdpi.com
Malware complexity is rapidly increasing, causing catastrophic impacts on computer
systems. Memory dump malware is gaining increased attention due to its ability to expose …

The power of comparative reasoning

J Yagnik, D Strelow, DA Ross… - … Conference on Computer …, 2011 - ieeexplore.ieee.org
Rank correlation measures are known for their resilience to perturbations in numeric values
and are widely used in many evaluation metrics. Such ordinal measures have rarely been …

Metaaware: Identifying metamorphic malware

Q Zhang, DS Reeves - Twenty-Third Annual Computer Security …, 2007 - ieeexplore.ieee.org
Detection of malicious software (malware) by the use of static signatures is often criticized for
being overly simplistic. Available methods of obfuscating code (so-called metamorphic …

Machine learning with adaptive rate processing for power quality disturbances identification

S Mian Qaisar, N Alyamani, A Waqar, M Krichen - SN Computer Science, 2022 - Springer
Power quality disturbances (PQDs) commonly occur in large-scale power systems and
networks that rise critical issues. Therefore, an automated recognition and mitigation of …