A malware detection scheme based on mining format information

J Bai, J Wang, G Zou - The Scientific World Journal, 2014 - Wiley Online Library
Malware has become one of the most serious threats to computer information system and
the current malware detection technology still has very significant limitations. In this paper …

Cobra: Fine-grained malware analysis using stealth localized-executions

A Vasudevan, R Yerraballi - … on Security and Privacy (S&P'06), 2006 - ieeexplore.ieee.org
Fine-grained code analysis in the context of malware is a complex and challenging task that
provides insight into malware code-layers (polymorphic/metamorphic), its data …

N-gram analysis for computer virus detection

DKS Reddy, AK Pujari - Journal in computer virology, 2006 - Springer
Generic computer virus detection is the need of the hour as most commercial antivirus
software fail to detect unknown and new viruses. Motivated by the success of …

RHMD: Evasion-resilient hardware malware detectors

KN Khasawneh, N Abu-Ghazaleh… - Proceedings of the 50th …, 2017 - dl.acm.org
Hardware Malware Detectors (HMDs) have recently been proposed as a defense against
the proliferation of malware. These detectors use low-level features, that can be collected by …

SBMDS: an interpretable string based malware detection system using SVM ensemble with bagging

Y Ye, L Chen, D Wang, T Li, Q Jiang… - Journal in computer …, 2009 - Springer
Malicious executables are programs designed to infiltrate or damage a computer system
without the owner's consent, which have become a serious threat to the security of computer …

A theoretical study of hardware performance counters-based malware detection

K Basu, P Krishnamurthy, F Khorrami… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
Malware can range from simple adware to stealthy kernel control-flow modifying rootkits.
Although anti-virus software is popular, an ongoing cat-and-mouse cycle of anti-virus …

High Coverage Detection of {Input-Related} Security Faults

E Larson, T Austin - 12th USENIX Security Symposium (USENIX Security …, 2003 - usenix.org
Improperly bounded program inputs present a major class of program defects. In secure
applications, these bugs can be exploited by malicious users, allowing them to overwrite …

Application of deep belief networks for opcode based malware detection

Y Ding, S Chen, J Xu - 2016 International Joint Conference on …, 2016 - ieeexplore.ieee.org
Deep belief nets (DBNs) have been successfully applied in various fields ranging from
image classification and audio recognition to information retrieval. Compared with traditional …

A framework for metamorphic malware analysis and real-time detection

S Alam, RN Horspool, I Traore, I Sogukpinar - computers & security, 2015 - Elsevier
Metamorphism is a technique that mutates the binary code using different obfuscations. It is
difficult to write a new metamorphic malware and in general malware writers reuse old …

Honeypot: a supplemented active defense system for network security

F Zhang, S Zhou, Z Qin, J Liu - Proceedings of the Fourth …, 2003 - ieeexplore.ieee.org
A honeypot is a supplemented active defense system for network security. It traps attacks,
records intrusion information about tools and activities of the hacking process, and prevents …