Malware dynamic analysis evasion techniques: A survey

A Afianian, S Niksefat, B Sadeghiyan… - ACM Computing Surveys …, 2019 - dl.acm.org
The cyber world is plagued with ever-evolving malware that readily infiltrate all defense
mechanisms, operate viciously unbeknownst to the user, and surreptitiously exfiltrate …

A survey on malware analysis and mitigation techniques

SS Chakkaravarthy, D Sangeetha, V Vaidehi - Computer Science Review, 2019 - Elsevier
In recent days, malwares are advanced, sophisticatedly engineered to attack the target. Most
of such advanced malwares are highly persistent and capable of escaping from the security …

A survey on automated dynamic malware analysis evasion and counter-evasion: Pc, mobile, and web

A Bulazel, B Yener - Proceedings of the 1st Reversing and Offensive …, 2017 - dl.acm.org
Automated dynamic malware analysis systems are important in combating the proliferation
of modern malware. Unfortunately, malware can often easily detect and evade these …

Hypercheck: A hardware-assistedintegrity monitor

F Zhang, J Wang, K Sun… - IEEE Transactions on …, 2013 - ieeexplore.ieee.org
The advent of cloud computing and inexpensive multi-core desktop architectures has led to
the widespread adoption of virtualization technologies. Furthermore, security researchers …

An inside look into the practice of malware analysis

M Yong Wong, M Landen, M Antonakakis… - Proceedings of the …, 2021 - dl.acm.org
Malware analysis aims to understand how malicious software carries out actions necessary
for a successful attack and identify the possible impacts of the attack. While there has been …

A survey and evaluation of android-based malware evasion techniques and detection frameworks

P Faruki, R Bhan, V Jain, S Bhatia, N El Madhoun… - Information, 2023 - mdpi.com
Android platform security is an active area of research where malware detection techniques
continuously evolve to identify novel malware and improve the timely and accurate detection …

On the dissection of evasive malware

DC D'Elia, E Coppa, F Palmaro… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Complex malware samples feature measures to impede automatic and manual analyses,
making their investigation cumbersome. While automatic characterization of malware …

Using hardware features for increased debugging transparency

F Zhang, K Leach, A Stavrou, H Wang… - 2015 IEEE Symposium …, 2015 - ieeexplore.ieee.org
With the rapid proliferation of malware attacks on the Internet, understanding these
malicious behaviors plays a critical role in crafting effective defense. Advanced malware …

Trustdump: Reliable memory acquisition on smartphones

H Sun, K Sun, Y Wang, J Jing, S Jajodia - … 7-11, 2014. Proceedings, Part I …, 2014 - Springer
With the wide usage of smartphones in our daily life, new malware is emerging to
compromise the mobile OS and steal the sensitive data from the mobile applications. Anti …

Privatezone: Providing a private execution environment using arm trustzone

J Jang, C Choi, J Lee, N Kwak, S Lee… - … on Dependable and …, 2016 - ieeexplore.ieee.org
ARM TrustZone is widely used to provide a Trusted Execution Environment (TEE) for mobile
devices. However, the use of TrustZone is limited because TrustZone resources are only …