4.5 Article

On the effectiveness of binary emulation in malware classification

相关参考文献

注意:仅列出部分参考文献,下载原文获取全部文献信息。
Article Computer Science, Hardware & Architecture

Malware Analysis by Combining Multiple Detectors and Observation Windows

Massimo Ficco

Summary: This article proposes an ensemble detector that combines generic and specialized detectors to increase the unpredictability and detection rate of malware. It also introduces an alpha-count mechanism for malware analysis and presents comparative results with other ensemble detectors.

IEEE TRANSACTIONS ON COMPUTERS (2022)

Review Computer Science, Information Systems

Research Trends, Challenges, and Emerging Topics in Digital Forensics: A Review of Reviews

Fran Casino et al.

Summary: Digital forensics plays a critical role in cybersecurity and has garnered significant attention from researchers and practitioners. However, existing research articles have mostly focused on specific domains within digital forensics, lacking a global perspective. To address this gap, we conducted a qualitative review of relevant studies, identified main topics and challenges, and emphasized technical, procedural, and ethical issues.

IEEE ACCESS (2022)

Article Computer Science, Theory & Methods

Resurrecting anti-virtualization and anti-debugging: Unhooking your hooks

Theodoros Apostolopoulos et al.

Summary: Dynamic malware analysis involves debugging binary files and monitoring changes in sandboxed environments. It allows investigators to manipulate code execution paths to understand malware behavior, but malware may incorporate defenses against virtual environments and debugging. Software vendors may also use similar methods to protect their intellectual property.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2021)

Article Computer Science, Hardware & Architecture

Intercepting Hail Hydra: Real-time detection of Algorithmically Generated Domains

Fran Casino et al.

Summary: The study examines the technical challenges faced by cybercriminals in controlling botnets and the use of Domain Generation Algorithms to evade take-down attempts. The HYDRAS dataset is introduced as the most comprehensive and representative dataset, highlighting different families and variants. Results show that the proposed approach significantly outperforms the current state-of-the-art in terms of both classification performance and efficiency.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2021)

Article Multidisciplinary Sciences

Improving Multivariate Microaggregation through Hamiltonian Paths and Optimal Univariate Microaggregation

Armando Maya-Lopez et al.

Summary: The collection of personal data is increasing rapidly, leading to privacy risks. To address this, various techniques have been proposed, with microaggregation being a popular method. This article introduces a heuristic solution inspired by the Traveling Salesman Problem and the optimal univariate microaggregation solution to tackle the multivariate microaggregation problem efficiently and effectively.

SYMMETRY-BASEL (2021)

Proceedings Paper Computer Science, Information Systems

An Inside Look into the Practice of Malware Analysis

Miuyin Yong Wong et al.

Summary: The study conducted user research on 21 professional malware analysts to understand their objectives, workflows, and factors considered when setting up dynamic analysis systems. Based on participant responses, a taxonomy of malware analysts and five common analysis workflows were proposed, along with challenges identified in different stages of analysis. Two potential directions for future research were also suggested, along with recommendations for improving tool usability.

CCS '21: PROCEEDINGS OF THE 2021 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (2021)

Article Computer Science, Information Systems

A dynamic Windows malware detection and prediction method based on contextual understanding of API call sequence

Eslam Amer et al.

COMPUTERS & SECURITY (2020)

Article Computer Science, Artificial Intelligence

Deep learning based Sequential model for malware analysis using Windows exe API Calls

Ferhat Ozgur Catak et al.

PEERJ COMPUTER SCIENCE (2020)

Article Computer Science, Information Systems

A Survey on Privacy Properties for Data Publishing of Relational Data

Athanasios Zigomitros et al.

IEEE ACCESS (2020)

Article Computer Science, Information Systems

Survey of machine learning techniques for malware analysis

Daniele Ucci et al.

COMPUTERS & SECURITY (2019)

Article Computer Science, Theory & Methods

Dynamic Malware Analysis in the Modern Era-A State of the Art Survey

Ori Or-Meir et al.

ACM COMPUTING SURVEYS (2019)

Article Business

Privacy-preserving collaborative filtering: A new approach based on variable-group-size microaggregation

Fran Casino et al.

ELECTRONIC COMMERCE RESEARCH AND APPLICATIONS (2019)

Article Computer Science, Information Systems

Dynamic API call sequence visualisation for malware classification

Mingdong Tang et al.

IET INFORMATION SECURITY (2019)

Article Computer Science, Information Systems

A Survey of Stealth Malware Attacks, Mitigation Measures, and Steps Toward Autonomous Open World Solutions

Ethan M. Rudd et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2017)

Article Computer Science, Artificial Intelligence

Sparseness Analysis in the Pretraining of Deep Neural Networks

Jun Li et al.

IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS (2017)

Proceedings Paper Computer Science, Information Systems

FIRMUSB: Vetting USB Device Firmware using Domain Informed Symbolic Execution

Grant Hernandez et al.

CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (2017)

Article Computer Science, Theory & Methods

Employing Program Semantics for Malware Detection

Smita Naval et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2015)

Article Computer Science, Information Systems

A Novel Approach to Detect Malware Based on API Call Sequence Analysis

Youngjoon Ki et al.

INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS (2015)

Article Computer Science, Theory & Methods

A Survey on Automated Dynamic Malware-Analysis Techniques and Tools

Manuel Egele et al.

ACM COMPUTING SURVEYS (2012)

Article Computer Science, Information Systems

Automatic analysis of malware behavior using machine learning

Konrad Rieck et al.

JOURNAL OF COMPUTER SECURITY (2011)

Article Computer Science, Information Systems

Graph-based malware detection using dynamic analysis

Blake Anderson et al.

JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES (2011)

Article Computer Science, Interdisciplinary Applications

Feature Selection with the Boruta Package

Miron B. Kursa et al.

JOURNAL OF STATISTICAL SOFTWARE (2010)

Article Computer Science, Information Systems

N-gram analysis for computer virus detection

D. Krishna Sandeep Reddy et al.

JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES (2006)

Article Mathematical & Computational Biology

Global goodness-of-fit tests in logistic regression with sparse data

O Kuss

STATISTICS IN MEDICINE (2002)