A Calleja, J Tapiador… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
During the last decades, the problem of malicious and unwanted software (malware) has surged in numbers and sophistication. Malware plays a key role in most of today's …
Binary analysis is useful in many practical applications, such as the detection of malware or vulnerable software components. However, our survey of the literature shows that most …
The use of third-party libraries in deployed applications can potentially put an organization's intellectual property at risk due to licensing restrictions requiring disclosure or distribution of …
J Upchurch, X Zhou - 2015 10th International Conference on …, 2015 - ieeexplore.ieee.org
This paper describes Variant, a testing framework for projects attempting to locate variants of malware families through similarity testing. The framework is a series of tests and data …
Reverse engineering is the primary step to analyze a piece of malware. After having disassembled a malware binary, a reverse engineer needs to spend extensive effort …
J Upchurch, X Zhou - 2016 11th International Conference on …, 2016 - ieeexplore.ieee.org
Detecting code reuse in software has applications in malicious code analysis and in malware code search and retrieval, but is complicated by the lack of available source code …
When the source code is unavailable, it is important for security applications, such as malware detection, software license infringement, vulnerability analysis, and digital forensics …
As the primary vehicle for most organized cybercrimes, malicious software (or malware) has become one of the most serious threats to computer systems and the Internet. With the …
F Adkins, L Jones, M Carlisle… - 2013 8th International …, 2013 - ieeexplore.ieee.org
Each day, malware analysts are tasked with more samples than they have the ability to analyze by hand. To produce this trend, malware authors often reuse a significant portion of …