Survey of machine learning techniques for malware analysis

D Ucci, L Aniello, R Baldoni - Computers & Security, 2019 - Elsevier
Coping with malware is getting more and more challenging, given their relentless growth in
complexity and volume. One of the most common approaches in literature is using machine …

Ransomware threat success factors, taxonomy, and countermeasures: A survey and research directions

BAS Al-Rimy, MA Maarof, SZM Shaid - Computers & Security, 2018 - Elsevier
Ransomware is a malware category that exploits security mechanisms such as cryptography
in order to hijack user files and related resources and demands money in exchange for the …

{UNVEIL}: A {Large-Scale}, automated approach to detecting ransomware

A Kharaz, S Arshad, C Mulliner, W Robertson… - 25th USENIX security …, 2016 - usenix.org
Although the concept of ransomware is not new (ie, such attacks date back at least as far as
the 1980s), this type of malware has recently experienced a resurgence in popularity. In fact …

Malware dynamic analysis evasion techniques: A survey

A Afianian, S Niksefat, B Sadeghiyan… - ACM Computing Surveys …, 2019 - dl.acm.org
The cyber world is plagued with ever-evolving malware that readily infiltrate all defense
mechanisms, operate viciously unbeknownst to the user, and surreptitiously exfiltrate …

A survey of the recent trends in deep learning based malware detection

UH Tayyab, FB Khan, MH Durad, A Khan… - Journal of Cybersecurity …, 2022 - mdpi.com
Monitoring Indicators of Compromise (IOC) leads to malware detection for identifying
malicious activity. Malicious activities potentially lead to a system breach or data …

System and method for detecting exfiltration content

D Kindlund, J Wolf, J Bennett - US Patent 9,565,202, 2017 - Google Patents
4,292,580 A 9, 1981 Ott et al. 5,175,732 A 12/1992 Hendel et al. 5.440, 723 A 8, 1995
Arnold et al. 5,657,473 A 8, 1997 Killean et al. 5,842,002 A 11/1998 Schnurer et al …

BODMAS: An open dataset for learning based temporal analysis of PE malware

L Yang, A Ciptadi, I Laziuk… - 2021 IEEE Security …, 2021 - ieeexplore.ieee.org
We describe and release an open PE malware dataset called BODMAS to facilitate research
efforts in machine learning based malware analysis. By closely examining existing open PE …

Distributed systems and methods for automatically detecting unknown bots and botnets

A Mushtaq, T Rosenberry, A Aziz, A Islam - US Patent 9,430,646, 2016 - Google Patents
Generally speaking, a bot is a type of (or part of) an active infiltration attack, often installing
or operating in a two-step process. The first step is the initial infection, which may be a …

Detection efficacy of virtual machine-based analysis with application specific events

S Paithane, S Vashisht - US Patent 9,262,635, 2016 - Google Patents
CPC................................. G06F 21/56, G06F 21/53 fying objects as malicious by processing
the objects in a virtual environment and monitoring behaviors during pro See application file …

Dynamically remote tuning of a malware content detection system

M Vincent, E Thioux, S Vashisht, D Kindlund - US Patent 9,223,972, 2015 - Google Patents
4,292,580 A 9, 1981 Ott et al. 5,175,732 A 12/1992 Hendel et al. 5.440, 723 A 8, 1995
Arnold et al. 5.490, 249 A 2, 1996 Miller 5,657,473 A 8, 1997 Killean et al. 5,842,002 A …