Detecting environment-sensitive malware

M Lindorfer, C Kolbitsch… - Recent Advances in …, 2011 - Springer
The execution of malware in an instrumented sandbox is a widespread approach for the
analysis of malicious code, largely because it sidesteps the difficulties involved in the static …

{BareCloud}: Bare-metal analysis-based evasive malware detection

D Kirat, G Vigna, C Kruegel - 23rd USENIX Security Symposium …, 2014 - usenix.org
The volume and the sophistication of malware are continuously increasing and evolving.
Automated dynamic malware analysis is a widely-adopted approach for detecting malicious …

A survey on automated dynamic malware analysis evasion and counter-evasion: Pc, mobile, and web

A Bulazel, B Yener - Proceedings of the 1st Reversing and Offensive …, 2017 - dl.acm.org
Automated dynamic malware analysis systems are important in combating the proliferation
of modern malware. Unfortunately, malware can often easily detect and evade these …

Malgene: Automatic extraction of malware analysis evasion signature

D Kirat, G Vigna - Proceedings of the 22nd ACM SIGSAC Conference on …, 2015 - dl.acm.org
Automated dynamic malware analysis is a common approach for detecting malicious
software. However, many malware samples identify the presence of the analysis …

Does every second count? time-based evolution of malware behavior in sandboxes

A Küchler, A Mantovani, Y Han, L Bilge… - NDSS 2021, Network …, 2021 - hal.science
The amount of time in which a sample is executed is one of the key parameters of a malware
analysis sandbox. Setting the threshold too high hinders the scalability and reduces the …

{BinSim}: Trace-based semantic binary diffing via system call sliced segment equivalence checking

J Ming, D Xu, Y Jiang, D Wu - 26th USENIX Security Symposium …, 2017 - usenix.org
Detecting differences between two binary executables (binary diffing), first derived from
patch analysis, have been widely employed in various software security analysis tasks, such …

{DATA}–differential address trace analysis: Finding address-based {Side-Channels} in binaries

S Weiser, A Zankl, R Spreitzer, K Miller… - 27th USENIX Security …, 2018 - usenix.org
Cryptographic implementations are a valuable target for address-based side-channel
attacks and should, thus, be protected against them. Countermeasures, however, are often …

On the dissection of evasive malware

DC D'Elia, E Coppa, F Palmaro… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Complex malware samples feature measures to impede automatic and manual analyses,
making their investigation cumbersome. While automatic characterization of malware …

[PDF][PDF] Evaluating the impact of malware analysis techniques for securing web applications through a decision-making framework under fuzzy environment

R Kumar, M Alenezi, MTJ Ansari, B Gupta… - Int. J. Intell. Eng …, 2020 - inass.org
Nowadays, most of the cyber-attacks are initiated by extremely malicious programs known
as Malware. Malwares are very vigorous and can penetrate the security of information and …

SYMBEXCEL: automated analysis and understanding of malicious excel 4.0 macros

N Ruaro, F Pagani, S Ortolani… - … IEEE Symposium on …, 2022 - ieeexplore.ieee.org
Malicious software (malware) poses a significant threat to the security of our networks and
users. In the ever-evolving malware landscape, Excel 4.0 Office macros (XL4) have recently …