Malware dynamic analysis evasion techniques: A survey

A Afianian, S Niksefat, B Sadeghiyan… - ACM Computing Surveys …, 2019 - dl.acm.org
The cyber world is plagued with ever-evolving malware that readily infiltrate all defense
mechanisms, operate viciously unbeknownst to the user, and surreptitiously exfiltrate …

A survey of adversarial attack and defense methods for malware classification in cyber security

S Yan, J Ren, W Wang, L Sun… - … Surveys & Tutorials, 2022 - ieeexplore.ieee.org
Malware poses a severe threat to cyber security. Attackers use malware to achieve their
malicious purposes, such as unauthorized access, stealing confidential data, blackmailing …

Tight arms race: Overview of current malware threats and trends in their detection

L Caviglione, M Choraś, I Corona, A Janicki… - IEEE …, 2020 - ieeexplore.ieee.org
Cyber attacks are currently blooming, as the attackers reap significant profits from them and
face a limited risk when compared to committing the “classical” crimes. One of the major …

A survey on automated dynamic malware analysis evasion and counter-evasion: Pc, mobile, and web

A Bulazel, B Yener - Proceedings of the 1st Reversing and Offensive …, 2017 - dl.acm.org
Automated dynamic malware analysis systems are important in combating the proliferation
of modern malware. Unfortunately, malware can often easily detect and evade these …

Spotless sandboxes: Evading malware analysis systems using wear-and-tear artifacts

N Miramirkhani, MP Appini, N Nikiforakis… - … IEEE Symposium on …, 2017 - ieeexplore.ieee.org
Malware sandboxes, widely used by antivirus companies, mobile application marketplaces,
threat detection appliances, and security researchers, face the challenge of environment …

Ransomware deployment methods and analysis: views from a predictive model and human responses

G Hull, H John, B Arief - Crime Science, 2019 - Springer
Ransomware incidents have increased dramatically in the past few years. The number of
ransomware variants is also increasing, which means signature and heuristic-based …

[HTML][HTML] RanSAP: An open dataset of ransomware storage access patterns for training machine learning models

M Hirano, R Hodota, R Kobayashi - Forensic Science International: Digital …, 2022 - Elsevier
Ransomware, the malicious software that encrypts user files to demand a ransom payment,
is one of the most common and persistent threats. Cyber-criminals create new ransomware …

Does every second count? time-based evolution of malware behavior in sandboxes

A Küchler, A Mantovani, Y Han, L Bilge… - NDSS 2021, Network …, 2021 - hal.science
The amount of time in which a sample is executed is one of the key parameters of a malware
analysis sandbox. Setting the threshold too high hinders the scalability and reduces the …

A Survey of strategy-driven evasion methods for PE malware: transformation, concealment, and attack

J Geng, J Wang, Z Fang, Y Zhou, D Wu, W Ge - Computers & Security, 2024 - Elsevier
The continuous proliferation of malware poses a formidable threat to the cyberspace
landscape. Researchers have proffered a multitude of sophisticated defense mechanisms …

Enhancing malware analysis sandboxes with emulated user behavior

S Liu, P Feng, S Wang, K Sun, J Cao - Computers & Security, 2022 - Elsevier
Cybersecurity teams have widely used malware analysis sandboxes to investigate the threat
of malware. Correspondingly, armored malware adopts various anti-sandbox techniques to …