Measuring software obfuscation quality–a systematic literature review

SA Ebad, AA Darem, JH Abawajy - IEEE Access, 2021 - ieeexplore.ieee.org
Software obfuscation techniques are increasingly being used to prevent attackers from
exploiting security flaws and launching successful attacks. With research on software …

When malware is packin'heat; limits of machine learning classifiers based on static analysis features

H Aghakhani, F Gritti, F Mecca, M Lindorfer… - Network and …, 2020 - par.nsf.gov
Machine learning techniques are widely used in addition to signatures and heuristics to
increase the detection rate of anti-malware software, as they automate the creation of …

A first look at the crypto-mining malware ecosystem: A decade of unrestricted wealth

S Pastrana, G Suarez-Tangil - Proceedings of the Internet Measurement …, 2019 - dl.acm.org
Illicit crypto-mining leverages resources stolen from victims to mine cryptocurrencies on
behalf of criminals. While recent works have analyzed one side of this threat, ie: web …

An hmm and structural entropy based detector for android malware: An empirical study

G Canfora, F Mercaldo, CA Visaggio - Computers & Security, 2016 - Elsevier
Smartphones are becoming more and more popular and, as a consequence, malware
writers are increasingly engaged to develop new threats and propagate them through official …

Prevalence and impact of low-entropy packing schemes in the malware ecosystem

A Mantovani, S Aonzo, X Ugarte-Pedrero… - NDSS 2020, Network …, 2020 - hal.science
An open research problem on malware analysis is how to statically distinguish between
packed and non-packed executables. This has an impact on antivirus software and malware …

An efficient approach to detect torrentlocker ransomware in computer systems

F Mbol, JM Robert, A Sadighian - … , CANS 2016, Milan, Italy, November 14 …, 2016 - Springer
TorrentLocker is a ransomware that encrypts sensitive data located on infected computer
systems. Its creators aim to ransom the victims, if they want to retrieve their data …

Towards paving the way for large-scale windows malware analysis: Generic binary unpacking with orders-of-magnitude performance boost

B Cheng, J Ming, J Fu, G Peng, T Chen… - Proceedings of the …, 2018 - dl.acm.org
Binary packing, encoding binary code prior to execution and decoding them at run time, is
the most common obfuscation adopted by malware authors to camouflage malicious code …

Improved deep learning model for static PE files malware detection and classification

SS Lad, AC Adamuthe - International Journal of Computer …, 2022 - search.proquest.com
Static analysis and detection of malware is a crucial phase for handling security threats.
Most researchers stated that the problem with the static analysis is an imbalance in the …

Packer detection for multi-layer executables using entropy analysis

M Bat-Erdene, T Kim, H Park, H Lee - Entropy, 2017 - mdpi.com
Packing algorithms are broadly used to avoid anti-malware systems, and the proportion of
packed malware has been growing rapidly. However, just a few studies have been …

Getting ahead of the arms race: hothousing the coevolution of virustotal with a packer

HD Menéndez, D Clark, E T. Barr - Entropy, 2021 - mdpi.com
Malware detection is in a coevolutionary arms race where the attackers and defenders are
constantly seeking advantage. This arms race is asymmetric: detection is harder and more …