Talos: no more ransomware victims with formal methods

A Cimitile, F Mercaldo, V Nardone, A Santone… - International Journal of …, 2018 - Springer
Ransomware is a very effective form of malware that is recently spreading out on an
impressive number of workstations and smartphones. This malware blocks the access to the …

A survey on metamorphic malware detection based on hidden Markov model

S kumar Sasidharan, C Thomas - … International conference on …, 2018 - ieeexplore.ieee.org
The phenomenon of information security threats increases every day. The statistical reports
from antivirus companies show that attackers use malicious applications as one of the major …

Metamorphic malware detection using structural features and nonnegative matrix factorization with hidden markov model

YT Ling, NFM Sani, MT Abdullah… - Journal of Computer …, 2022 - Springer
Metamorphic malware modifies its code structure using a morphing engine to evade
traditional signature-based detection. Previous research has shown the use of opcode …

An advanced profile hidden Markov model for malware detection

AA Alipour, E Ansari - Intelligent Data Analysis, 2020 - content.iospress.com
The rapid growth of malicious software (malware) production in recent decades and the
increasing number of threats posed by malware to network environments, such as the …

[PDF][PDF] Short review on metamorphic malware detection in hidden Markov models

YT Ling, NFM Sani - International Journal, 2017 - researchgate.net
Metamorphic malware is well known for evading signature-based detection. To cope up with
numerous malware which can emerge easily by using open source malware generator …

Proposing an efficient approach for malware clustering

M Mohammadi, A Hamzeh - 2017 Artificial Intelligence and …, 2017 - ieeexplore.ieee.org
Recently, malwares in security threats have a top rank which can damage computing
systems and networks seriously. Over time malwares become more complicated and …

Practical aspects related to using Hidden Markov Models for detecting metamorphic file infectors

D Cosovan, CV Lita - … on Symbolic and Numeric Algorithms for …, 2017 - ieeexplore.ieee.org
Hidden Markov Models (HMMs) have been widely used recently for detection of
metamorphic malware families. In this paper, we address some practical aspects which …

Malgazer: An Automated Malware Classifier With Running Window Entropy And Machine Learning

K Jones - 2019 - scholar.dsu.edu
This dissertation explores functional malware classification using running window entropy
and machine learning classifiers. This topic was under researched in the prior literature, but …

Classifying advanced malware into families based on instruction link analysis

A Tabatabaei - 2018 - search.proquest.com
With the ever-increasing growth of network resources, a great number of organizations are
extremely dependent on the internet for operational activities as such, exposing their …