M Xu, L Wu, S Qi, J Xu, H Zhang, Y Ren… - Journal of Computer …, 2013 - Springer
Code obfuscating technique plays a significant role to produce new obfuscated malicious programs, generally called malware variants, from previously encountered malwares …
Well-designed metamorphic malware can evade many commonly used malware detection techniques including signature scanning. In this research, we consider a score based on …
ARA Grégio, RDC Santos - Sensors, and Command, Control …, 2011 - spiedigitallibrary.org
Malware spread via Internet is a great security threat, so studying their behavior is important to identify and classify them. Using SSDT hooking we can obtain malware behavior by …
M Eskandari, S Hashemi - Journal in Computer Virology, 2012 - Springer
Vicious codes, especially viruses, as a kind of impressive malware have caused many disasters and continue to exploit more vulnerabilities. These codes are injected inside …
Z Shafiq, A Liu - 2017 IFIP Networking Conference (IFIP …, 2017 - ieeexplore.ieee.org
Due to the unavailability of signatures for previously unknown malware, non-signature malware detection schemes typically rely on analyzing program behavior. Prior behavior …
Autonomous Baiting, Control and Deception of Adversarial Cyberspace Participants (ABCD- ACP) is an experimental defensive framework against potentially adversarial cyberspace …
You do not understand how your program really works until it has been exploited. We believe that computer scientists and software engineers should regard the activity of modern …
In this thesis we describe novel approaches to the formal description of systems which reproduce, and show that the resulting models have explanatory power and practical …