Dynamic malware analysis in the modern era—A state of the art survey

O Or-Meir, N Nissim, Y Elovici, L Rokach - ACM Computing Surveys …, 2019 - dl.acm.org
Although malicious software (malware) has been around since the early days of computers,
the sophistication and innovation of malware has increased over the years. In particular, the …

A survey on hypervisor-based monitoring: approaches, applications, and evolutions

E Bauman, G Ayoade, Z Lin - ACM Computing Surveys (CSUR), 2015 - dl.acm.org
When designing computer monitoring systems, one goal has always been to have a
complete view of the monitored target and at the same time stealthily protect the monitor …

A comparison of static, dynamic, and hybrid analysis for malware detection

A Damodaran, FD Troia, CA Visaggio… - Journal of Computer …, 2017 - Springer
In this research, we compare malware detection techniques based on static, dynamic, and
hybrid analysis. Specifically, we train Hidden Markov Models (HMMs) on both static and …

Scalability, fidelity and stealth in the DRAKVUF dynamic malware analysis system

TK Lengyel, S Maresca, BD Payne… - Proceedings of the 30th …, 2014 - dl.acm.org
Malware is one of the biggest security threats on the Internet today and deploying effective
defensive solutions requires the rapid analysis of a continuously increasing number of …

Sok: Introspections on trust and the semantic gap

B Jain, MB Baig, D Zhang, DE Porter… - 2014 IEEE symposium …, 2014 - ieeexplore.ieee.org
An essential goal of Virtual Machine Introspection (VMI) is assuring security policy
enforcement and overall functionality in the presence of an untrustworthy OS. A fundamental …

Visualizing the outcome of dynamic analysis of Android malware with VizMal

A De Lorenzo, F Martinelli, E Medvet… - Journal of Information …, 2020 - Elsevier
Malware detection techniques based on signature extraction require security analysts to
manually inspect samples to find evidences of malicious behavior. This time-consuming task …

[PDF][PDF] SigGraph: Brute Force Scanning of Kernel Data Structure Instances Using Graph-based Signatures.

Z Lin, J Rhee, X Zhang, D Xu, X Jiang - Ndss, 2011 - researchgate.net
Brute force scanning of kernel memory images for finding kernel data structure instances is
an important function in many computer security and forensics applications. Brute force …

Ki-mon arm: A hardware-assisted event-triggered monitoring platform for mutable kernel object

H Lee, H Moon, I Heo, D Jang, J Jang… - … on Dependable and …, 2017 - ieeexplore.ieee.org
External hardware-based kernel integrity monitors have been proposed to mitigate kernel-
level malwares. However, the existing external approaches have been limited to monitoring …

[PDF][PDF] Malware detection based on hybrid signature behaviour application programming interface call graph

AAE Elhadi, MA Maarof, AH Osman - American Journal of Applied …, 2012 - Citeseer
Problem statement: A malware is a program that has malicious intent. Nowadays, malware
authors apply several sophisticated techniques such as packing and obfuscation to avoid …

[PDF][PDF] Improving the detection of malware behaviour using simplified data dependent API call graph

AAE Elhadi, MA Maarof, B Barry - International Journal of Security …, 2013 - researchgate.net
Malware stands for malicious software. It is software that is designed with a harmful intent. A
malware detector is a system that attempts to identify malware using Application …