Measuring and modeling the label dynamics of online {Anti-Malware} engines

S Zhu, J Shi, L Yang, B Qin, Z Zhang, L Song… - 29th USENIX Security …, 2020 - usenix.org
VirusTotal provides malware labels from a large set of anti-malware engines, and is heavily
used by researchers for malware annotation and system evaluation. Since different engines …

Cybercrime specialization: An exposé of a malicious Android Obfuscation-as-a-Service

V Šembera, M Paquet-Clouston… - 2021 IEEE European …, 2021 - ieeexplore.ieee.org
Malware authors constantly obfuscate their files and defenders regularly develop new
techniques to detect them. Given this cat-and-mouse game, specialized obfuscation services …

Android malware development on public malware scanning platforms: A large-scale data-driven study

H Huang, C Zheng, J Zeng, W Zhou… - … Conference on Big …, 2016 - ieeexplore.ieee.org
Android malware scanning services (eg, VirusTotal) are websites that users submit
suspicious Android programs and get an array of malware detection results. With the …

Characterizing malicious url campaigns

M Almashor, E Ahmed, B Pick, S Abuadbba… - arXiv preprint arXiv …, 2021 - arxiv.org
URLs are central to a myriad of cyber-security threats, from phishing to the distribution of
malware. Their inherent ease of use and familiarity is continuously abused by attackers to …

Towards {Large-Scale} Hunting for Android {Negative-Day} Malware

LP Yuan, W Hu, T Yu, P Liu, S Zhu - 22nd International Symposium on …, 2019 - usenix.org
Android malware writers often utilize online malware scanners to check how well their
malware can evade detection, and indeed we can find malware scan reports that were …

Maximizing accuracy in multi-scanner malware detection systems

MN Sakib, CT Huang, YD Lin - Computer Networks, 2020 - Elsevier
A variety of anti-malware scanners have been developed for malware detection. Previous
research has indicated that combining multiple different scanners can achieve better result …

Analysis of WhatsApp Mod User Awareness Information Security with Static Analysis Methods and Quantitative Methods

B Santoso, MA Ghofur, J Kuswanto - Prosiding Seminar Nasional …, 2021 - aau.e-journal.id
increase and have a good or bad impact on the security of information that exists in
cyberspace, this existing information security can be spread and accessed by irresponsible …

Re-measuring the Label Dynamics of Online Anti-Malware Engines from Millions of Samples

J Wang, L Wang, F Dong, H Wang - Proceedings of the 2023 ACM on …, 2023 - dl.acm.org
VirusTotal is the most widely used online scanning service in both academia and industry.
However, it is known that the results returned by antivirus engines are often inconsistent and …

Unraveling Threat Intelligence Through the Lens of Malicious URL Campaigns

M Almashor, E Ahmed, B Pick, J Xue… - Proceedings of the 18th …, 2023 - dl.acm.org
The daily deluge of alerts is a sombre reality for Security Operations Centre (SOC)
personnel worldwide. Those on the front-lines of cybersecurity face the unenviable task of …

Identifying meaningful clusters in malware data

RC de Amorim, CDL Ruiz - Expert Systems with Applications, 2021 - Elsevier
Finding meaningful clusters in drive-by-download malware data is a particularly difficult task.
Malware data tends to contain overlapping clusters with wide variations of cardinality. This …