File packing from the malware perspective: Techniques, analysis approaches, and directions for enhancements

T Muralidharan, A Cohen, N Gerson… - ACM Computing Surveys, 2022 - dl.acm.org
With the growing sophistication of malware, the need to devise improved malware detection
schemes is crucial. The packing of executable files, which is one of the most common …

A survey on botnets, issues, threats, methods, detection and prevention

H Owen, J Zarrin, SM Pour - Journal of Cybersecurity and Privacy, 2022 - mdpi.com
Botnets have become increasingly common and progressively dangerous to both business
and domestic networks alike. Due to the Covid-19 pandemic, a large quantity of the …

A survey on run-time packers and mitigation techniques

E Alkhateeb, A Ghorbani, A Habibi Lashkari - International Journal of …, 2024 - Springer
The battle between malware analysts and malware authors is a never-ending challenge with
the advent of complex malware such as polymorphic, metamorphic, and packed malware. A …

PackGenome: Automatically Generating Robust YARA Rules for Accurate Malware Packer Detection

S Li, J Ming, P Qiu, Q Chen, L Liu, H Bao… - Proceedings of the …, 2023 - dl.acm.org
Binary packing, a widely-used program obfuscation style, compresses or encrypts the
original program and then recovers it at runtime. Packed malware samples are pervasive …

Identifying Malware Packers through Multilayer Feature Engineering in Static Analysis

E Alkhateeb, A Ghorbani, A Habibi Lashkari - Information, 2024 - mdpi.com
This research addresses a critical need in the ongoing battle against malware, particularly in
the form of obfuscated malware, which presents a formidable challenge in the realm of …

Design and Performance Analysis of an Anti-Malware System based on Generative Adversarial Network Framework

FB Khan, MH Durad, A Khan, FA Khan, M Rizwan… - IEEE …, 2024 - ieeexplore.ieee.org
The cyber realm is overwhelmed with dynamic malware that promptly penetrates all defense
mechanisms, operates unapprehended to the user, and covertly causes damage to sensitive …

Analysis of machine learning approaches to packing detection

CHB Van Ouytsel, KHT Dam, A Legay - Computers & Security, 2024 - Elsevier
Packing is a widely used obfuscation technique by which malware hides content and
behavior. Much research explores how to detect a packed program via such varied …

Evading Deep Learning-Based Malware Detectors via Obfuscation: A Deep Reinforcement Learning Approach

B Etter, JL Hu, M Ebrahimi, W Li, X Li… - 2023 IEEE International …, 2023 - ieeexplore.ieee.org
Adversarial Malware Generation (AMG), the generation of adversarial malware variants to
strengthen Deep Learning (DL)-based malware detectors has emerged as a crucial tool in …

Bespoke Sequence of Transformations for an Enhanced Entropic Wavelet Energy Spectrum Discernment for Higher Efficacy Detection of Metamorphic Malware

S Chan - The Eighth International Conference on Cyber …, 2023 - papers.ssrn.com
Abstract A Robust Convex Relaxation (RCR) Long Short-Term Memory (LSTM) Deep
Learning Neural Network (DLNN) can provide enhanced Entropic Wavelet Energy Spectrum …

SeqTrace: API Call Tracing Based on Intel PT and VMI for Malware Detection

Z Ding, Y Guo, H Xu, L Yan, L Cui, Y Peng… - … on Algorithms and …, 2022 - Springer
API-call sequence, a significant dynamic feature of the software, is widely applied to
malware detection. Unfortunately, native approaches to API-call analysis are time …