Results 1 to 10 of about 1,405 (158)

Memory Visualization-Based Malware Detection Technique

open access: yesSensors, 2022
Advanced Persistent Threat is an attack campaign in which an intruder or team of intruders establishes a long-term presence on a network to mine sensitive data, which becomes more dangerous when combined with polymorphic malware.
Syed Shakir Hameed Shah   +2 more
doaj   +3 more sources

Malware homology determination using visualized images and feature fusion [PDF]

open access: yesPeerJ Computer Science, 2021
The family homology determination of malware has become a research hotspot as the number of malware variants are on the rise. However, existing studies on malware visualization only determines homology based on the global structure features of executable,
Xuejin Zhu   +3 more
doaj   +4 more sources

Malware Analysis Using Visualized Image Matrices [PDF]

open access: yesThe Scientific World Journal, 2014
This paper proposes a novel malware visual analysis method that contains not only a visualization method to convert binary files into images, but also a similarity calculation method between these images.
KyoungSoo Han, BooJoong Kang, Eul Gyu Im
doaj   +3 more sources

Malware Visualization for Fine-Grained Classification

open access: yesIEEE Access, 2018
Due to the rapid rise of automated tools, the number of malware variants has increased dramatically, which poses a tremendous threat to the security of the Internet.
Jianwen Fu   +4 more
doaj   +2 more sources

MalView: Interactive Visual Analytics for Comprehending Malware Behavior

open access: yesIEEE Access, 2022
Malicious applications are usually comprehended through two major techniques, namely static and dynamic analyses. Through static analysis, a given malicious program is parsed, and some representative artifacts (e.g., control-flow graphs) are produced ...
Huyen N. Nguyen   +5 more
doaj   +3 more sources

Detection and Visualization of Android Malware Behavior [PDF]

open access: yesJournal of Electrical and Computer Engineering, 2016
Malware analysts still need to manually inspect malware samples that are considered suspicious by heuristic rules. They dissect software pieces and look for malware evidence in the code.
Oscar Somarriba   +4 more
doaj   +5 more sources

PAFE: A lightweight visualization-based fast malware classification method

open access: yesHeliyon
With the development of automated malware toolkits, cybersecurity faces evolving threats. Although visualization-based malware analysis has proven to be an effective method, existing approaches struggle with challenging malware samples due to alterations
Sicong Li   +3 more
doaj   +3 more sources

Malware Family Classification Model Based on MobileNet [PDF]

open access: yesJisuanji gongcheng, 2020
The existing malicious code classification method based on Convolutional Neural Network(CNN) has the problem of large computational resource consumption.In order to reduce the computational quantity and parameter quantity in the classification process ...
ZENG Yaqin, ZHANG Linlin, ZHANG Ruonan, YANG Bo
doaj   +1 more source

Malware Detection Based on Code Visualization and Two-Level Classification

open access: yesInformation, 2021
Malware creators generate new malicious software samples by making minor changes in previously generated code, in order to reuse malicious code, as well as to go unnoticed from signature-based antivirus software.
Vassilios Moussas, Antonios Andreatos
doaj   +1 more source

Malware detection based on semi-supervised learning with malware visualization

open access: yesMathematical Biosciences and Engineering, 2021
The traditional signature-based detection method requires detailed manual analysis to extract the signatures of malicious samples, and requires a large number of manual markers to maintain the signature library, which brings a great time and resource costs, and makes it difficult to adapt to the rapid generation and mutation of malware.
Tan Gao, Lan Zhao, Xudong Li, Wen Chen
openaire   +3 more sources

Home - About - Disclaimer - Privacy