Control flow-based opcode behavior analysis for malware detection

Y Ding, W Dai, S Yan, Y Zhang - Computers & Security, 2014 - Elsevier
Opcode sequences from decompiled executables have been employed to detect malware.
Currently, opcode sequences are extracted using text-based methods, and the limitation of …

DDSGA: A data-driven semi-global alignment approach for detecting masquerade attacks

HA Kholidy, F Baiardi, S Hariri - IEEE Transactions on …, 2014 - ieeexplore.ieee.org
A masquerade attacker impersonates a legal user to utilize the user services and privileges.
The semi-global alignment algorithm (SGA) is one of the most effective and efficient …

A fast malware detection algorithm based on objective-oriented association mining

Y Ding, X Yuan, K Tang, X Xiao, Y Zhang - Computers & security, 2013 - Elsevier
Objective-oriented association (OOA) mining has been successfully applied in malware
detection. One problem of OOA mining is that the number of association rules is very large …

Feature representation and selection in malicious code detection methods based on static system calls

D Yuxin, Y Xuebing, Z Di, D Li, A Zhanchao - Computers & Security, 2011 - Elsevier
Currently almost all static methods for detecting malicious code are signature-based, this
leads the result that viruses can easily escape detection by simple mechanisms such as …

Fuzzy approach for intrusion detection based on user's commands

P Kudłacik, P Porwik, T Wesołowski - Soft Computing, 2016 - Springer
The article concerns the problem of detecting masqueraders in computer systems. A
masquerader in a computer system is an intruder who pretends to be a legitimate user in …

Adaptive Naive Bayes method for masquerade detection

SK Dash, KS Reddy, AK Pujari - Security and Communication …, 2011 - Wiley Online Library
Recently, researchers have proposed efficient detection mechanisms for masquerade
attacks. Most of these techniques use machine learning methods to learn the behavioral …

New Malicious Code Detection Using Variable Length n-grams

DKS Reddy, SK Dash, AK Pujari - … 2006, Kolkata, India, December 19-21 …, 2006 - Springer
Most of the commercial antivirus software fail to detect unknown and new malicious code. In
order to handle this problem generic virus detection is a viable option. Generic virus detector …

Masquerade detection based upon gui user profiling in linux systems

WN Bhukya, SK Kommuru, A Negi - … , Doha, Qatar, December 9-11, 2007 …, 2007 - Springer
Masquerading or impersonation attack refers to the act of gaining access to confidential data
or greater access privileges, while pretending to be legitimate users. Detection of …

Detecting masquerades using a combination of Naïve Bayes and weighted RBF approach

A Sharma, KK Paliwal - Journal in Computer Virology, 2007 - Springer
Masquerade detection by automated means is gaining widespread interest due to the
serious impact of masquerades on computer system or network. Several techniques have …

Program obfuscation by strong cryptography

Ž Vrba, P Halvorsen, C Griwodz - … International Conference on …, 2010 - ieeexplore.ieee.org
Program obfuscation is often employed by malware in order to avoid detection by anti-virus
software, but it has many other legitimate uses, such as copy protection, software licensing …