File packing from the malware perspective: Techniques, analysis approaches, and directions for enhancements

T Muralidharan, A Cohen, N Gerson… - ACM Computing Surveys, 2022 - dl.acm.org
With the growing sophistication of malware, the need to devise improved malware detection
schemes is crucial. The packing of executable files, which is one of the most common …

Machine learning aided static malware analysis: A survey and tutorial

A Shalaginov, S Banin, A Dehghantanha… - Cyber threat …, 2018 - Springer
Malware analysis and detection techniques have been evolving during the last decade as a
reflection to development of different malware techniques to evade network-based and host …

Classification of focal and non focal EEG using entropies

N Arunkumar, K Ramkumar, V Venkatraman… - Pattern Recognition …, 2017 - Elsevier
Electroencephalogram (EEG) is the recording of the electrical activity of the brain which can
be used to identify different disease conditions. In the case of a partial epilepsy, some …

A Survey of strategy-driven evasion methods for PE malware: transformation, concealment, and attack

J Geng, J Wang, Z Fang, Y Zhou, D Wu, W Ge - Computers & Security, 2024 - Elsevier
The continuous proliferation of malware poses a formidable threat to the cyberspace
landscape. Researchers have proffered a multitude of sophisticated defense mechanisms …

Entropy features for focal EEG and non focal EEG

N Arunkumar, KR Kumar, V Venkataraman - Journal of computational …, 2018 - Elsevier
Electroencephalogram (EEG) is the recording of the electrical activity of the brain which can
be used to identify different disease conditions. In the case of a partial epilepsy, some …

CloudIntell: An intelligent malware detection system

QKA Mirza, I Awan, M Younas - Future Generation Computer Systems, 2018 - Elsevier
Enterprises and individual users heavily rely on the abilities of antiviruses and other security
mechanisms. However, the methodologies used by such software are not enough to detect …

MaliCage: A packed malware family classification framework based on DNN and GAN

X Gao, C Hu, C Shan, W Han - Journal of Information Security and …, 2022 - Elsevier
To evade security detection, hackers always add a deceptive packer outside of the original
malicious codes. The coexistence of original unpacked samples and packed samples of …

A static, packer-agnostic filter to detect similar malware samples

G Jacob, PM Comparetti, M Neugschwandtner… - Detection of Intrusions …, 2013 - Springer
The steadily increasing number of malware variants is a significant problem, clogging the
input queues of automated analysis tools. The generation of malware variants is made easy …

Local non-negative matrix factorization as a visual representation

T Feng, SZ Li, HY Shum… - … on Development and …, 2002 - ieeexplore.ieee.org
Proposes a novel method, called local non-negative matrix factorization (LNMF), for learning
a spatially localized, parts-based subspace representation of visual patterns. An objective …

Entropy analysis to classify unknown packing algorithms for malware detection

M Bat-Erdene, H Park, H Li, H Lee, MS Choi - International Journal of …, 2017 - Springer
The proportion of packed malware has been growing rapidly and now comprises more than
80% of all existing malware. In this paper, we propose a method for classifying the packing …