Results 21 to 30 of about 25,310,274 (105)
Android malware analysis in a nutshell
This paper offers a comprehensive analysis model for android malware. The model presents the essential factors affecting the analysis results of android malware that are vision-based.
Iman M. Almomani +2 more
semanticscholar +1 more source
Mal-Netminer: Malware Classification Approach based on Social Network Analysis of System Call Graph [PDF]
As the security landscape evolves over time, where thousands of species of malicious codes are seen every day, antivirus vendors strive to detect and classify malware families for efficient and effective responses against malware campaigns.
Jang, Jae-wook +4 more
core +3 more sources
Sisyfos: A Modular and Extendable Open Malware Analysis Platform
Sisyfos is a modular and extensible platform for malware analysis; it addresses multiple operating systems, including critical infrastructure ones. Its purpose is to enable the development and evaluation of new tools as well as the evaluation of malware ...
D. Serpanos +3 more
semanticscholar +1 more source
Hypervisor-assisted dynamic malware analysis
Malware analysis is a task of utmost importance in cyber-security. Two approaches exist for malware analysis: static and dynamic. Modern malware uses an abundance of techniques to evade both dynamic and static analysis tools.
Roee S. Leon +3 more
semanticscholar +1 more source
Can We Trust Your Explanations? Sanity Checks for Interpreters in Android Malware Analysis [PDF]
With the rapid growth of Android malware, many machine learning-based malware analysis approaches are proposed to mitigate the severe phenomenon. However, such classifiers are opaque, non-intuitive, and difficult for analysts to understand the inner ...
Ming Fan +5 more
semanticscholar +1 more source
Obfuscation-based malware update: A comparison of manual and automated methods [PDF]
Indexación: Scopus; Web of Science.This research presents a proposal of malware classification and its update based on capacity and obfuscation. This article is an extension of [4]a, and describes the procedure for malware updating, that is, to take ...
BarrÃa, C. +4 more
core +2 more sources
Dynamic Malware Analysis with Feature Engineering and Feature Learning [PDF]
Dynamic malware analysis executes the program in an isolated environment and monitors its run-time behaviour (e.g. system API calls) for malware detection.
Zhaoqi Zhang, Panpan Qi, Wei Wang
semanticscholar +1 more source
A Study of the Relationship Between Antivirus Regressions and Label Changes [PDF]
AntiVirus (AV) products use multiple components to detect malware. A component which is found in virtually all AVs is the signature-based detection engine: this component assigns a particular signature label to a malware that the AV detects.
Cukier, M. +4 more
core +1 more source
On the Reverse Engineering of the Citadel Botnet [PDF]
Citadel is an advanced information-stealing malware which targets financial information. This malware poses a real threat against the confidentiality and integrity of personal and business data. A joint operation was recently conducted by the FBI and the
A Rahimian +4 more
core +3 more sources
Android Malware Family Classification Based on Resource Consumption over Time
The vast majority of today's mobile malware targets Android devices. This has pushed the research effort in Android malware analysis in the last years.
Aniello, Leonardo +5 more
core +1 more source

