A survey on automated dynamic malware-analysis techniques and tools

M Egele, T Scholte, E Kirda, C Kruegel - ACM computing surveys (CSUR …, 2008 - dl.acm.org
Anti-virus vendors are confronted with a multitude of potentially malicious samples today.
Receiving thousands of new samples every day is not uncommon. The signatures that …

Darknet as a source of cyber intelligence: Survey, taxonomy, and characterization

C Fachkha, M Debbabi - IEEE Communications Surveys & …, 2015 - ieeexplore.ieee.org
Today, the Internet security community largely emphasizes cyberspace monitoring for the
purpose of generating cyber intelligence. In this paper, we present a survey on darknet. The …

Does every second count? time-based evolution of malware behavior in sandboxes

A Küchler, A Mantovani, Y Han, L Bilge… - NDSS 2021, Network …, 2021 - hal.science
The amount of time in which a sample is executed is one of the key parameters of a malware
analysis sandbox. Setting the threshold too high hinders the scalability and reduces the …

Challenges and pitfalls in malware research

M Botacin, F Ceschin, R Sun, D Oliveira, A Grégio - Computers & Security, 2021 - Elsevier
As the malware research field became more established over the last two decades, new
research questions arose, such as how to make malware research reproducible, how to …

Bayesian bot detection based on DNS traffic similarity

R Villamarín-Salomón, JC Brustoloni - … of the 2009 ACM symposium on …, 2009 - dl.acm.org
Bots often are detected by their communication with a command and control (C&C)
infrastructure. To evade detection, botmasters are increasingly obfuscating C&C …

Automatic malware mutant detection and group classification based on the n-gram and clustering coefficient

T Lee, B Choi, Y Shin, J Kwak - The Journal of Supercomputing, 2018 - Springer
The majority of recent cyber incidents have been caused by malware. According to a report
by Symantec, an average of one million malicious codes is found daily. Automated static and …

Towards network containment in malware analysis systems

M Graziano, C Leita, D Balzarotti - … of the 28th Annual Computer Security …, 2012 - dl.acm.org
This paper focuses on the containment and control of the network interaction generated by
malware samples in dynamic analysis environments. A currently unsolved problem consists …

[PDF][PDF] YALIH, yet another low interaction honeyclient

M Mansoori, I Welch, Q Fu - … of the Twelfth …, 2014 - crpit.scem.westernsydney.edu.au
Low-interaction honeyclients employ static detection techniques such as signatures,
heuristic or anomaly detection in the identification of malicious websites. They are …

IT2FS-based ontology with soft-computing mechanism for malware behavior analysis

HD Huang, CS Lee, MH Wang, HY Kao - Soft Computing, 2014 - Springer
Antimalware application is one of the most important research issues in the area of cyber
security threat. Nowadays, because hackers continuously develop novel techniques to …

An unknown trojan detection method based on software network behavior

Y Liang, G Peng, H Zhang, Y Wang - Wuhan University Journal of Natural …, 2013 - Springer
Aiming at the difficulty of unknown Trojan detection in the APT flooding situation, an
improved detecting method has been proposed. The basic idea of this method originates …