The first steps in analyzing defensive malware are understanding what obfuscations are present in real-world malware binaries, how these obfuscations hinder analysis, and how …
Machine learning techniques are widely used in addition to signatures and heuristics to increase the detection rate of anti-malware software, as they automate the creation of …
Run-time packers are often used by malware-writers to obfuscate their code and hinder static analysis. The packer problem has been widely studied, and several solutions have …
G Bonfante, J Fernandez, JY Marion, B Rouxel… - Proceedings of the …, 2015 - dl.acm.org
Fighting malware involves analyzing large numbers of suspicious binary files. In this context, disassembly is a crucial task in malware analysis and reverse engineering. It involves the …
M Ollivier, S Bardin, R Bonichon… - Proceedings of the 35th …, 2019 - dl.acm.org
Code obfuscation is a major tool for protecting software intellectual property from attacks such as reverse engineering or code tampering. Yet, recently proposed (automated) attacks …
B Cheng, J Ming, J Fu, G Peng, T Chen… - Proceedings of the …, 2018 - dl.acm.org
Binary packing, encoding binary code prior to execution and decoding them at run time, is the most common obfuscation adopted by malware authors to camouflage malicious code …
C LeDoux, A Lakhotia - Intelligent Methods for Cyber Warfare, 2014 - Springer
Abstract Malware analysts use Machine Learning to aid in the fight against the unstemmed tide of new malware encountered on a daily, even hourly, basis. The marriage of these two …
Recent reports from the anti-malware industry indicate similarity between malware code resulting from code reuse can aid in developing a profile of the attackers. We describe a …
M Protsenko, S Kreuter, T Müller - 2015 10th International …, 2015 - ieeexplore.ieee.org
With over one billion sold devices, representing 80% market share, Android remains the most popular platform for mobile devices. Application piracy on this platform is a major …