A Survey of strategy-driven evasion methods for PE malware: transformation, concealment, and attack

J Geng, J Wang, Z Fang, Y Zhou, D Wu, W Ge - Computers & Security, 2024 - Elsevier
The continuous proliferation of malware poses a formidable threat to the cyberspace
landscape. Researchers have proffered a multitude of sophisticated defense mechanisms …

Yamme: a yara-byte-signatures metamorphic mutation engine

A Coscia, V Dentamaro, S Galantucci… - IEEE Transactions …, 2023 - ieeexplore.ieee.org
Recognition of known malicious patterns through signature-based systems is unsuccessful
against malware for which no known signature exists to identify them. These include not only …

A survey on hardware-based malware detection approaches

CP Chenet, A Savino, S Di Carlo - IEEE Access, 2024 - ieeexplore.ieee.org
This paper delves into the dynamic landscape of computer security, where malware poses a
paramount threat. Our focus is a riveting exploration of the recent and promising hardware …

Enhanced detection of obfuscated malware in memory dumps: a machine learning approach for advanced cybersecurity

MA Hossain, MS Islam - Cybersecurity, 2024 - Springer
In the realm of cybersecurity, the detection and analysis of obfuscated malware remain a
critical challenge, especially in the context of memory dumps. This research paper presents …

AI-enabled approach for enhancing obfuscated malware detection: a hybrid ensemble learning with combined feature selection techniques

MA Hossain, MA Haque, S Ahmad… - International Journal of …, 2024 - Springer
In an era where the relentless evolution of cyber threats necessitates the perpetual
advancement of security measures, the detection of obfuscated malware has emerged as a …

Graph-oriented modelling of process event activity for the detection of malware

K Brezinski, K Ferens - 2023 Congress in Computer Science …, 2023 - ieeexplore.ieee.org
This paper presents an approach to malware detection using Graph Neural Networks (GNN)
to capture the complex relationships and dependencies between different components of an …

Malware family classification with semi-supervised learning

ML Colangelo - 2023 - webthesis.biblio.polito.it
In recent years, the spread of malware has increased exponentially, posing a significant
challenge for cybersecurity experts. When facing with the constantly evolving world of …

[PDF][PDF] МЕТОД ОБНАРУЖЕНИЯ ПРОГРАММ-ВЫМОГАТЕЛЕЙ НА ОСНОВЕ АНАЛИЗА ПОВЕДЕНЧЕСКОГО ОТЧЕТА ИСПОЛНЯЕМОГО ОБЪЕКТА

МИ Стародубов, ИЛ Артемьева… - Вопросы …, 2024 - cyberrus.info
86 of any computer program can be represented as a set of records of its actions in a
behavior report, which can be considered as signs of an object. The paper analyzes reports …