Opcodes as predictor for malware

D Bilar - International journal of electronic security and …, 2007 - inderscienceonline.com
This paper discusses a detection mechanism for malicious code through statistical analysis
of opcode distributions. A total of 67 malware executables were sampled statically …

Profiling and classifying the behavior of malicious codes

M Alazab - Journal of Systems and Software, 2015 - Elsevier
Malware is a major security threat confronting computer systems and networks and has
increased in scale and impact from the early days of ICT. Traditional protection mechanisms …

Leveraging support vector machine for opcode density based detection of crypto-ransomware

J Baldwin, A Dehghantanha - Cyber threat intelligence, 2018 - Springer
Ransomware is a significant global threat, with easy deployment due to the prevalent
ransomware-as-a-service model. Machine learning algorithms incorporating the use of …

SVM training phase reduction using dataset feature filtering for malware detection

P O'Kane, S Sezer, K McLaughlin… - IEEE transactions on …, 2013 - ieeexplore.ieee.org
N-gram analysis is an approach that investigates the structure of a program using bytes,
characters, or text strings. A key issue with N-gram analysis is feature selection amidst the …

Systems and methods for detecting copied computer code using fingerprints

DJ Rogers, M Moore, D Blazakis - US Patent 9,459,861, 2016 - Google Patents
8, 140,850 B2 3/2012 Horne et al. 8,214,497 B2 7/2012 Alperovitch et al. 8,365,277 B2
1/2013 Kim et al. 8,370,634 B2 2/2013 Horne et al. 8,495,755 B2 7, 2013 Jin et al. 8,533,848 …

Detecting obfuscated malware using reduced opcode set and optimised runtime trace

P O'kane, S Sezer, K McLaughlin - Security Informatics, 2016 - Springer
The research presented, investigates the optimal set of operational codes (opcodes) that
create a robust indicator of malicious software (malware) and also determines a program's …

A hybrid set of complexity metrics for large-scale object-oriented software systems

YT Ma, KQ He, B Li, J Liu, XY Zhou - Journal of Computer Science and …, 2010 - Springer
Large-scale object-oriented (OO) software systems have recently been found to share global
network characteristics such as small world and scale free, which go beyond the scope of …

Malware detection: program run length against detection rate

P Okane, S Sezer, K McLaughlin, EG Im - IET software, 2014 - Wiley Online Library
N‐gram analysis is an approach that investigates the structure of a program using bytes,
characters or text strings. This research uses dynamic analysis to investigate malware …

N-gram density based malware detection

P O'Kane, S Sezer, K McLaughlin - 2014 World Symposium on …, 2014 - ieeexplore.ieee.org
N-gram analysis is an approach that investigates the structure of a program using bytes,
characters or text strings. This research uses dynamic analysis to investigate malware …

Static signature-based malware detection using opcode and binary information

A Jalilian, Z Narimani, E Ansari - Data Science: From Research to …, 2020 - Springer
Internet continues to evolve and touches every aspect of our daily life thus communications
through internet is becoming inevitable. Computer security has been hence becoming one …