Classification and analysis of malicious code detection techniques based on the APT attack

K Lee, J Lee, K Yim - Applied Sciences, 2023 - mdpi.com
According to the Fire-eye's M-Trends Annual Threat Report 2022, there are many advanced
persistent threat (APT) attacks that are currently in use, and such continuous and specialized …

A survey of malware behavior description and analysis

B Yu, Y Fang, Q Yang, Y Tang, L Liu - Frontiers of Information Technology …, 2018 - Springer
Behavior-based malware analysis is an important technique for automatically analyzing and
detecting malware, and it has received considerable attention from both academic and …

A privacy-conserving framework based intrusion detection method for detecting and recognizing malicious behaviours in cyber-physical power networks

IA Khan, D Pi, N Khan, ZU Khan, Y Hussain… - Applied …, 2021 - Springer
Abstract Contemporary Smart Power Systems (SPNs) depend on Cyber-Physical Systems
(CPSs) to connect physical devices and control tools. Developing a robust privacy …

A hybrid machine learning approach for malicious behaviour detection and recognition in cloud computing

M Rabbani, YL Wang, R Khoshkangini… - Journal of Network and …, 2020 - Elsevier
The rapid growth of new emerging computing technologies has encouraged many
organizations to outsource their data and computational requirements. Such services are …

Does every second count? time-based evolution of malware behavior in sandboxes

A Küchler, A Mantovani, Y Han, L Bilge… - NDSS 2021, Network …, 2021 - hal.science
The amount of time in which a sample is executed is one of the key parameters of a malware
analysis sandbox. Setting the threshold too high hinders the scalability and reduces the …

A Survey of strategy-driven evasion methods for PE malware: transformation, concealment, and attack

J Geng, J Wang, Z Fang, Y Zhou, D Wu, W Ge - Computers & Security, 2024 - Elsevier
The continuous proliferation of malware poses a formidable threat to the cyberspace
landscape. Researchers have proffered a multitude of sophisticated defense mechanisms …

Efficient dynamic malware analysis using virtual time control mechanics

CH Lin, HK Pao, JW Liao - Computers & Security, 2018 - Elsevier
Efficient detection of stealthy malware attacks in suspicious files is very challenging as
dynamic malware analysis is time consuming. This paper proposes a virtual time control …

Humans vs. machines in malware classification

S Aonzo, Y Han, A Mantovani, D Balzarotti - 32nd USENIX Security …, 2023 - usenix.org
Humans vs. Machines in Malware Classification Page 1 This paper is included in the
Proceedings of the 32nd USENIX Security Symposium. August 9–11, 2023 • Anaheim, CA, USA …

[HTML][HTML] Getting to the root of the problem: A detailed comparison of kernel and user level data for dynamic malware analysis

M Nunes, P Burnap, O Rana, P Reinecke… - Journal of Information …, 2019 - Elsevier
Dynamic malware analysis is fast gaining popularity over static analysis since it is not easily
defeated by evasion tactics such as obfuscation and polymorphism. During dynamic …

A Consensus Framework for Reliability and Mitigation of Zero‐Day Attacks in IoT

V Sharma, K Lee, S Kwon, J Kim, H Park… - Security and …, 2017 - Wiley Online Library
“Internet of Things”(IoT) bridges the communication barrier between the computing entities
by forming a network between them. With a common solution for control and management of …