Dynamic malware analysis in the modern era—A state of the art survey

O Or-Meir, N Nissim, Y Elovici, L Rokach - ACM Computing Surveys …, 2019 - dl.acm.org
Although malicious software (malware) has been around since the early days of computers,
the sophistication and innovation of malware has increased over the years. In particular, the …

A survey on malware detection using data mining techniques

Y Ye, T Li, D Adjeroh, SS Iyengar - ACM Computing Surveys (CSUR), 2017 - dl.acm.org
In the Internet age, malware (such as viruses, trojans, ransomware, and bots) has posed
serious and evolving security threats to Internet users. To protect legitimate users from these …

Novel feature extraction, selection and fusion for effective malware family classification

M Ahmadi, D Ulyanov, S Semenov, M Trofimov… - Proceedings of the sixth …, 2016 - dl.acm.org
Modern malware is designed with mutation characteristics, namely polymorphism and
metamorphism, which causes an enormous growth in the number of variants of malware …

Malware dynamic analysis evasion techniques: A survey

A Afianian, S Niksefat, B Sadeghiyan… - ACM Computing Surveys …, 2019 - dl.acm.org
The cyber world is plagued with ever-evolving malware that readily infiltrate all defense
mechanisms, operate viciously unbeknownst to the user, and surreptitiously exfiltrate …

Analysis of ResNet and GoogleNet models for malware detection

RU Khan, X Zhang, R Kumar - Journal of Computer Virology and Hacking …, 2019 - Springer
We have utilized two distinct models to identify the obscure or new sort of malware in this
paper. GoogleNet and ResNet models are researched and tried which belong to two …

[PDF][PDF] A survey on malware analysis techniques: Static, dynamic, hybrid and memory analysis

R Sihwail, K Omar, KAZ Ariffin - Int. J. Adv. Sci. Eng. Inf. Technol, 2018 - core.ac.uk
The threats malware pose to the people around the world are increasing rapidly. A software
that sneaks to your computer system without your knowledge with a harmful intent to disrupt …

[PDF][PDF] Copperdroid: Automatic reconstruction of android malware behaviors.

K Tam, SJ Khan, A Fattori, L Cavallaro - Ndss, 2015 - core.ac.uk
Mobile devices and their application marketplaces drive the entire economy of the today's
mobile landscape. Android platforms alone have produced staggering revenues, exceeding …

[HTML][HTML] Malware analysis and classification: A survey

E Gandotra, D Bansal, S Sofat - Journal of Information Security, 2014 - scirp.org
One of the major and serious threats on the Internet today is malicious software, often
referred to as a malware. The malwares being designed by attackers are polymorphic and …

Automatic analysis of malware behavior using machine learning

K Rieck, P Trinius, C Willems… - Journal of computer …, 2011 - content.iospress.com
Malicious software–so called malware–poses a major threat to the security of computer
systems. The amount and diversity of its variants render classic security defenses ineffective …

Detecting environment-sensitive malware

M Lindorfer, C Kolbitsch… - Recent Advances in …, 2011 - Springer
The execution of malware in an instrumented sandbox is a widespread approach for the
analysis of malicious code, largely because it sidesteps the difficulties involved in the static …