Malware dynamic analysis evasion techniques: A survey

A Afianian, S Niksefat, B Sadeghiyan… - ACM Computing Surveys …, 2019 - dl.acm.org
The cyber world is plagued with ever-evolving malware that readily infiltrate all defense
mechanisms, operate viciously unbeknownst to the user, and surreptitiously exfiltrate …

Hardware Trojan attacks: Threat analysis and countermeasures

S Bhunia, MS Hsiao, M Banga… - Proceedings of the …, 2014 - ieeexplore.ieee.org
Security of a computer system has been traditionally related to the security of the software or
the information being processed. The underlying hardware used for information processing …

[HTML][HTML] A survey on neural networks for (cyber-) security and (cyber-) security of neural networks

M Pawlicki, R Kozik, M Choraś - Neurocomputing, 2022 - Elsevier
The goal of this systematic and broad survey is to present and discuss the main challenges
that are posed by the implementation of Artificial Intelligence and Machine Learning in the …

Intrusion detection approach based on optimised artificial neural network

M Choraś, M Pawlicki - Neurocomputing, 2021 - Elsevier
Abstract Context and rationale Intrusion Detection, the ability to detect malware and other
attacks, is a crucial aspect to ensure cybersecurity. So is the ability to identify this myriad of …

[PDF][PDF] Learning to detect and classify malicious executables in the wild.

JZ Kolter, MA Maloof - Journal of Machine Learning Research, 2006 - jmlr.org
We describe the use of machine learning and data mining to detect and classify malicious
executables as they appear in the wild. We gathered 1,971 benign and 1,651 malicious …

Semantics-aware malware detection

M Christodorescu, S Jha, SA Seshia… - … IEEE symposium on …, 2005 - ieeexplore.ieee.org
A malware detector is a system that attempts to determine whether a program has malicious
intent. In order to evade detection, malware writers (hackers) frequently use obfuscation to …

[HTML][HTML] Static analysis of executables to detect malicious patterns

M Christodorescu, S Jha - 12th USENIX Security Symposium (USENIX …, 2003 - usenix.org
Malicious code detection is a crucial component of any defense mechanism. In this paper,
we present a unique viewpoint on malicious code detection. We regard malicious code …

[PDF][PDF] A survey of malware detection techniques

N Idika, AP Mathur - Purdue University, 2007 - profsandhu.com
Malware is a worldwide epidemic. Studies suggest that the impact of malware is getting
worse. Malware detectors are the primary tools in defense against malware. The quality of …

Learning to detect malicious executables in the wild

JZ Kolter, MA Maloof - Proceedings of the tenth ACM SIGKDD …, 2004 - dl.acm.org
In this paper, we describe the development of a fielded application for detecting malicious
executables in the wild. We gathered 1971 benign and 1651 malicious executables and …

Recent advancements in microarchitectural security: Review of machine learning countermeasures

H Sayadi, H Wang, T Miari, HM Makrani… - 2020 IEEE 63rd …, 2020 - ieeexplore.ieee.org
Recent microarchitectural security countermeasures by employing applications' low-level
features collected from Hardware Performance Counters (HPCs) registers have emerged as …