Review of signature-based techniques in antivirus products

M Al-Asli, TA Ghaleb - 2019 International Conference on …, 2019 - ieeexplore.ieee.org
Existing antivirus products employ diverse types of techniques to detect malware or any
suspicious activities. The majority of such techniques rely on signature-based detection …

Similarity hash based scoring of portable executable files for efficient malware detection in IoT

AP Namanya, IU Awan, JP Disso, M Younas - Future Generation Computer …, 2020 - Elsevier
The current rise in malicious attacks shows that existing security systems are bypassed by
malicious files. Similarity hashing has been adopted for sample triaging in malware analysis …

Malware family classification method based on static feature extraction

B Sun, Q Li, Y Guo, Q Wen, X Lin… - 2017 3rd IEEE …, 2017 - ieeexplore.ieee.org
With the development of malicious code engineering, new malware samples carry variability
and polymorphism, which makes the malware variants show an increasingly growing trend …

Static malware analysis using machine learning algorithms on APT1 dataset with string and PE header features

N Balram, G Hsieh, C McFall - 2019 International Conference …, 2019 - ieeexplore.ieee.org
Static malware analysis is used to analyze executable files without executing the code to
determine whether a file is malicious or not. Data analytic and machine learning techniques …

Classifying potentially malicious and benign software modules through similarity analysis

A Buyukkayhan, Z Li, AM Oprea, M Rosa - US Patent 9,998,484, 2018 - Google Patents
A method comprises obtaining at least a first software module not classified as benign or
potentially malicious, extracting a set of features associated with the first software module …

Dynamic analysis of malware using run-time opcodes

D Carlin, P O'Kane, S Sezer - Data Analytics and Decision Support for …, 2017 - Springer
The continuing fight against intentionally malicious software has, to date, favoured the
proliferators of malware. Signature detection methods are growingly impotent against rapidly …

Detection of malicious portable executables using evidence combinational theory with fuzzy hashing

AP Namanya, QKA Mirza… - 2016 IEEE 4th …, 2016 - ieeexplore.ieee.org
Fuzzy hashing is a known technique that has been adopted to speed up malware analysis
processes. However, Hashing has not been fully implemented for malware detection …

Classifying software modules based on comparisons using a neighborhood distance metric

AM Oprea, Z Li, A Buyukkayhan - US Patent 10,122,742, 2018 - Google Patents
A method comprises obtaining at least a first software module not classified as benign or
potentially malicious, extracting a set of features associated with the first software module …

A Survey of Malware Forensics Analysis Techniques and Tools

S Al-Sofyani, A Alelayani, F Al-zahrani… - 2023 1st International …, 2023 - ieeexplore.ieee.org
With technological progress, the risk factor resulting from malware is increasing dramatically.
In this paper, we present the most prominent techniques and tools used in malware …

Leveraging AI tools for Detection, Recognition, and Mitigation of Malicious Code

SC Ngwobia - 2023 - search.proquest.com
The advent of sophisticated IT software tools has enabled attackers with the necessary
capacity to develop dangerous metamorphic or polymorphic malware. And because of the …