A comprehensive review on malware detection approaches

ÖA Aslan, R Samet - IEEE access, 2020 - ieeexplore.ieee.org
According to the recent studies, malicious software (malware) is increasing at an alarming
rate, and some malware can hide in the system by using different obfuscation techniques. In …

Vehicle security: A survey of security issues and vulnerabilities, malware attacks and defenses

AA Elkhail, RUD Refat, R Habre, A Hafeez… - IEEE …, 2021 - ieeexplore.ieee.org
Recent years have led the path to the evolution of automotive technology and with these
new developments, modern vehicles are getting increasingly astute and offering growing …

A prototype implementation and evaluation of the malware detection mechanism for IoT devices using the processor information

H Takase, R Kobayashi, M Kato, R Ohmura - International Journal of …, 2020 - Springer
Due to the popularization of Internet of Things (IoT) devices, numerous and varied devices
have been connected to the Internet. While various devices including home appliances …

Malware detection using bilayer behavior abstraction and improved one-class support vector machines

Q Miao, J Liu, Y Cao, J Song - International Journal of Information Security, 2016 - Springer
Malware detection is one of the most challenging problems in computer security. Recently,
methods based on machine learning are very popular in unknown and variant malware …

Understanding uses and misuses of similarity hashing functions for malware detection and family clustering in actual scenarios

M Botacin, VHG Moia, F Ceschin… - Forensic Science …, 2021 - Elsevier
An everyday growing number of malware variants target end-users and organizations. To
reduce the amount of individual malware handling, security analysts apply techniques for …

Enhancing Malware Classification via Self-Similarity Techniques

F Zhong, Q Hu, Y Jiang, J Huang… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Despite continuous advancements in defense mechanisms, attackers often find ways to
circumvent security measures. Windows operating systems, in particular, are vulnerable due …

Minimized feature overhead malware detection machine learning model employing MRMR‐based ranking

P Singh, SK Borgohain, LD Sharma… - Concurrency and …, 2022 - Wiley Online Library
To deal with the huge amount of data, minimizing the overhead will play a key role in speedy
and efficient malware detection. We propose a machine learning (ML) malware detection …

Variant: a malware similarity testing framework

J Upchurch, X Zhou - 2015 10th International Conference on …, 2015 - ieeexplore.ieee.org
This paper describes Variant, a testing framework for projects attempting to locate variants of
malware families through similarity testing. The framework is a series of tests and data …

A review of detecting malware in android devices based on machine learning techniques

M Sharma, A Kaul - Expert Systems, 2024 - Wiley Online Library
Malware developers install malware on mobile users' devices and steal their personal
information without their knowledge. According to recent studies, it has been observed that …

Malware provenance: code reuse detection in malicious software at scale

J Upchurch, X Zhou - 2016 11th International Conference on …, 2016 - ieeexplore.ieee.org
Detecting code reuse in software has applications in malicious code analysis and in
malware code search and retrieval, but is complicated by the lack of available source code …