ScrapeIOC: Designing a Web-scraping Tool for Malware Detection based on Indicators of Compromise

KCP Fernandes, SL Jonker, W Meng… - 2023 IEEE …, 2023 - ieeexplore.ieee.org
Modern malware profoundly impacts our digitized planet; its victims range from private
individuals to governments to international corporations. Therefore, it is essential to collect …

Evaluation of System Features Used for Malware Detection

Š Balogh, J Mojžiš, P Krammer - Proceedings of the Future Technologies …, 2022 - Springer
For the current detection of malware, automatic detection tools are widely used that apply
machine learning techniques and algorithms. In these approaches, it is very important to …

CBM: free, automatic malware analysis framework using API call sequences

Y Qiao, Y Yang, J He, C Tang, Z Liu - Knowledge Engineering and …, 2014 - Springer
Classic static code analysis for malware is ineffective when challenged by diverse variants.
As a result, dynamic analysis based on malware behavior is becoming thriving in malware …

II Malware Analysis

R Negi, S Venkatesan, SK Shukla - 2023 - ieeexplore.ieee.org
Cyber security is one of the most critical problems faced by enterprises, government
organizations, education institutes, small and medium scale businesses, and medical …

Eureka: A framework for enabling static malware analysis

M Sharif, V Yegneswaran, H Saidi, P Porras… - … Security-ESORICS 2008 …, 2008 - Springer
We introduce Eureka, a framework for enabling static analysis on Internet malware binaries.
Eureka incorporates a novel binary unpacking strategy based on statistical bigram analysis …

Detection of packed malware

D Devi, S Nandi - Proceedings of the First International Conference on …, 2012 - dl.acm.org
Packing is the most popular obfuscation technique used by malware writers' community in
present scenario. The traditional signature-based anti-virus software had played a major …

Empowering anti-malware research in Japan by sharing the MWS datasets

M Hatada, M Akiyama, T Matsuki… - Journal of Information …, 2015 - jstage.jst.go.jp
Substantial research has been conducted to develop proactive and reactive
countermeasures against malware threats. Gathering and analyzing data are widely …

6 Malware also Needs “Attention”

R Negi, S Venkatesan, SK Shukla - 2023 - ieeexplore.ieee.org
Cyber security is one of the most critical problems faced by enterprises, government
organizations, education institutes, small and medium scale businesses, and medical …

GoldenEye: Efficiently and Effectively Unveiling Malware's Targeted Environment

Z Xu, J Zhang, G Gu, Z Lin - Research in Attacks, Intrusions and Defenses …, 2014 - Springer
A critical challenge when combating malware threat is how to efficiently and effectively
identify the targeted victim's environment, given an unknown malware sample …

Malware detection issues, future trends and challenges: a survey

A AliAhmad, D Eleyan, A Eleyan… - 2023 International …, 2023 - ieeexplore.ieee.org
This paper focuses on the challenges and issues of detecting malware in to-day's world
where cyberattacks continue to grow in number and complexity. The paper reviews current …