Academic literature on the topic 'Evasive malware'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Evasive malware.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Evasive malware"
Gruber, Jan, and Felix Freiling. "Fighting Evasive Malware." Datenschutz und Datensicherheit - DuD 46, no. 5 (May 2022): 284–90. http://dx.doi.org/10.1007/s11623-022-1604-9.
Full textEgitmen, Alper, Irfan Bulut, R. Can Aygun, A. Bilge Gunduz, Omer Seyrekbasan, and A. Gokhan Yavuz. "Combat Mobile Evasive Malware via Skip-Gram-Based Malware Detection." Security and Communication Networks 2020 (April 20, 2020): 1–10. http://dx.doi.org/10.1155/2020/6726147.
Full textVidyarthi, Deepti, S. P. Choudhary, Subrata Rakshit, and C. R. S. Kumar. "Malware Detection by Static Checking and Dynamic Analysis of Executables." International Journal of Information Security and Privacy 11, no. 3 (July 2017): 29–41. http://dx.doi.org/10.4018/ijisp.2017070103.
Full textKrishna, T. Shiva Rama. "Malware Detection using Deep Learning." International Journal for Research in Applied Science and Engineering Technology 9, no. VI (June 20, 2021): 1847–53. http://dx.doi.org/10.22214/ijraset.2021.35426.
Full textD'Elia, Daniele Cono, Emilio Coppa, Federico Palmaro, and Lorenzo Cavallaro. "On the Dissection of Evasive Malware." IEEE Transactions on Information Forensics and Security 15 (2020): 2750–65. http://dx.doi.org/10.1109/tifs.2020.2976559.
Full textCara, Fabrizio, Michele Scalas, Giorgio Giacinto, and Davide Maiorca. "On the Feasibility of Adversarial Sample Creation Using the Android System API." Information 11, no. 9 (September 10, 2020): 433. http://dx.doi.org/10.3390/info11090433.
Full textMills, Alan, and Phil Legg. "Investigating Anti-Evasion Malware Triggers Using Automated Sandbox Reconfiguration Techniques." Journal of Cybersecurity and Privacy 1, no. 1 (November 20, 2020): 19–39. http://dx.doi.org/10.3390/jcp1010003.
Full textIlić, Slaviša, Milan Gnjatović, Brankica Popović, and Nemanja Maček. "A pilot comparative analysis of the Cuckoo and Drakvuf sandboxes: An end-user perspective." Vojnotehnicki glasnik 70, no. 2 (2022): 372–92. http://dx.doi.org/10.5937/vojtehg70-36196.
Full textDjufri, Faiz Iman, and Charles Lim. "Revealing and Sharing Malware Profile Using Malware Threat Intelligence Platform." ACMIT Proceedings 6, no. 1 (July 6, 2021): 72–82. http://dx.doi.org/10.33555/acmit.v6i1.100.
Full textKawakoya, Yuhei, Eitaro Shioji, Makoto Iwamura, and Jun Miyoshi. "API Chaser: Taint-Assisted Sandbox for Evasive Malware Analysis." Journal of Information Processing 27 (2019): 297–314. http://dx.doi.org/10.2197/ipsjjip.27.297.
Full textDissertations / Theses on the topic "Evasive malware"
Nisi, Dario. "Unveiling and mitigating common pitfalls in malware analysis." Electronic Thesis or Diss., Sorbonne université, 2021. http://www.theses.fr/2021SORUS528.
Full textAs the importance of computer systems in modern-day societies grows, so does the damage that malicious software causes. The security industry and malware authors engaged in an arms race, in which the first creates better detection systems while the second try to evade them. In fact, any wrong assumption (no matter how subtle) in the design of an anti-malware tool may create new avenues for evading detection. This thesis focuses on two often overlooked aspects of modern malware analysis techniques: the use of API-level information to encode malicious behavior and the reimplementation of parsing routines for executable file formats in security-oriented tools. We show that taking advantage of these practices is possible on a large and automated scale. Moreover, we study the feasibility of fixing these problems at their roots, measuring the difficulties that anti-malware architects may encounter and providing strategies to solve them
Lu, Gen. "Analysis of Evasion Techniques in Web-based Malware." Diss., The University of Arizona, 2013. http://hdl.handle.net/10150/312567.
Full textHaffejee, Jameel. "An analysis of malware evasion techniques against modern AV engines." Thesis, Rhodes University, 2015. http://hdl.handle.net/10962/5821.
Full textSidor, Samuel. "Vylepšený sandboxing pro pokročilé kmeny malwaru." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2021. http://www.nusl.cz/ntk/nusl-442403.
Full textLi, Hao, and 李昊. "Guided Execution Path Exploration for Evasive Malware Analysis." Thesis, 2018. http://ndltd.ncl.edu.tw/handle/s63mm6.
Full text國立交通大學
資訊科學與工程研究所
106
In recent years, malware has become a severe problem on the Internet. Modern malware is often equipped with evasion techniques to prevent itself from being analyzed by sandbox-based analysis. To fight against evasive malware, analysts need to trigger the deliberately hidden malicious behaviors by execution path exploration. Nonetheless, currently the common methods for path exploration suffer from the path explosion problem and is hard to exhaust all paths. In this thesis, we proposed an approach to guiding the execution paths exploration toward the most suspicious execution paths in order to reach the hidden malicious behaviors in limited time. We learned the patterns of malicious behaviors and evasion techniques from malware in the wild and evasion techniques commonly used by malware authors. By analyzing the potential behaviors and the prerequisites of paths in the samples, our analysis systems can trigger the hidden behaviors faster to enable the analysts to process evasive malware samples. As indicated in the experiments, our approach can discover the hidden behaviors faster with fewer paths explored where time consumption of the analysis is reduced to 89%.
Chen, Ting-Wen, and 陳鼎文. "Automatic Sourcing for Symbolic Execution in Evasive Malware Analysis." Thesis, 2016. http://ndltd.ncl.edu.tw/handle/66689369422897880085.
Full textZhang, Nian-Zu, and 張念祖. "A Study on Evasion Techniques of Anti-Analysis Malware by Examples." Thesis, 2015. http://ndltd.ncl.edu.tw/handle/sa6mw9.
Full text健行科技大學
資訊工程系碩士班
103
There are a large number of unknown malware sample recently. However, computer technology has not been developed in the past decade. It was told that quantity does not equal quality. But the quality of malware is improving with time. All kinds of anti-analysis technology is to conflict with information security personnel. Actually, samples analyze by manual analysis is inefficient. Besides, there have Anti-Analysis technology to disturb analysts, Because of that, there is an Automated Malware Analysis System to against them(Hereinafter referred to as SandBox). It not only have a environment that can be controlled and have monitor and collect sample modules, but also have static analysis, and the most important modules that can trigger samples. This system improve the efficiency of the analyzed sample and this is the best way to analyze sample until now. “While the priest climbs a post, the devil climbs ten”, malware developer start to develop Anti-SandBox technology. It will stop doing malicious behavior as soon as it detect there is a SandBox .Of course, SandBox can not detect suspicious information. This paper aims to study Anti-Sanbox or Anti-VM mechanism try to use existing SandBox technology for analysing malware, and find how the malware can avoide SandBox caught and identifying current running on what kind of SandBox software Finally, the experiment will out of into a single software technology, provding the user free with this technology for investigating SandBox environment.
Ersan, Erkan. "On the (in)security of behavioral-based dynamic anti-malware techniques." Thesis, 2017. http://hdl.handle.net/1828/7935.
Full textGraduate
2018-02-07
0984
erkanersan@gmail.com
Book chapters on the topic "Evasive malware"
Tanabe, Rui, Wataru Ueno, Kou Ishii, Katsunari Yoshioka, Tsutomu Matsumoto, Takahiro Kasama, Daisuke Inoue, and Christian Rossow. "Evasive Malware via Identifier Implanting." In Detection of Intrusions and Malware, and Vulnerability Assessment, 162–84. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-93411-2_8.
Full textHăjmăşan, Gheorghe, Alexandra Mondoc, Radu Portase, and Octavian Creţ. "Evasive Malware Detection Using Groups of Processes." In ICT Systems Security and Privacy Protection, 32–45. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-58469-0_3.
Full textKang, Min Gyung, Juan Caballero, and Dawn Song. "Distributed Evasive Scan Techniques and Countermeasures." In Detection of Intrusions and Malware, and Vulnerability Assessment, 157–74. Berlin, Heidelberg: Springer Berlin Heidelberg, 2007. http://dx.doi.org/10.1007/978-3-540-73614-1_10.
Full textMohanta, Abhijit, and Anoop Saldanha. "Armoring and Evasion: The Anti-Techniques." In Malware Analysis and Detection Engineering, 691–720. Berkeley, CA: Apress, 2020. http://dx.doi.org/10.1007/978-1-4842-6193-4_19.
Full textRoyo, Álvaro Arribas, Manuel Sánchez Rubio, Walter Fuertes, Mauro Callejas Cuervo, Carlos Andrés Estrada, and Theofilos Toulkeridis. "Malware Security Evasion Techniques: An Original Keylogger Implementation." In Advances in Intelligent Systems and Computing, 375–84. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-72657-7_36.
Full textLeguesse, Yonas, Mark Vella, and Joshua Ellul. "AndroNeo: Hardening Android Malware Sandboxes by Predicting Evasion Heuristics." In Information Security Theory and Practice, 140–52. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-93524-9_9.
Full textBiondi, Fabrizio, Thomas Given-Wilson, Axel Legay, Cassius Puodzius, and Jean Quilbeuf. "Tutorial: An Overview of Malware Detection and Evasion Techniques." In Leveraging Applications of Formal Methods, Verification and Validation. Modeling, 565–86. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-03418-4_34.
Full textYamamoto, Risa, and Mamoru Mimura. "On the Possibility of Evasion Attacks with Macro Malware." In Advances in Intelligent Systems and Computing, 43–59. Singapore: Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-16-5301-8_4.
Full textYokoyama, Akira, Kou Ishii, Rui Tanabe, Yinmin Papa, Katsunari Yoshioka, Tsutomu Matsumoto, Takahiro Kasama, et al. "SandPrint: Fingerprinting Malware Sandboxes to Provide Intelligence for Sandbox Evasion." In Research in Attacks, Intrusions, and Defenses, 165–87. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-45719-2_8.
Full textChen, Lingwei, Shifu Hou, Yanfang Ye, and Lifei Chen. "An Adversarial Machine Learning Model Against Android Malware Evasion Attacks." In Web and Big Data, 43–55. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-69781-9_5.
Full textConference papers on the topic "Evasive malware"
Borders, K., Xin Zhao, and A. Prakash. "Siren: catching evasive malware." In 2006 IEEE Symposium on Security and Privacy. IEEE, 2006. http://dx.doi.org/10.1109/sp.2006.37.
Full textBotacin, Marcus, Vitor Falcão da Rocha, Paulo Lício de Geus, and André Grégio. "Analysis, Anti-Analysis, Anti-Anti-Analysis: An Overview of the Evasive Malware Scenario." In Simpósio Brasileiro de Segurança da Informação e de Sistemas Computacionais. Sociedade Brasileira de Computação - SBC, 2017. http://dx.doi.org/10.5753/sbseg.2017.19504.
Full textZhang, Jialong, Zhongshu Gu, Jiyong Jang, Dhilung Kirat, Marc Stoecklin, Xiaokui Shu, and Heqing Huang. "Scarecrow: Deactivating Evasive Malware via Its Own Evasive Logic." In 2020 50th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN). IEEE, 2020. http://dx.doi.org/10.1109/dsn48063.2020.00027.
Full textNicho, Mathew, and Maitha Alkhateri. "Modeling Evasive Malware Authoring Techniques." In 2021 5th Cyber Security in Networking Conference (CSNet). IEEE, 2021. http://dx.doi.org/10.1109/csnet52717.2021.9614645.
Full textKoutsokostas, Vasilios, and Constantinos Patsakis. "Python and Malware: Developing Stealth and Evasive Malware without Obfuscation." In 18th International Conference on Security and Cryptography. SCITEPRESS - Science and Technology Publications, 2021. http://dx.doi.org/10.5220/0010541501250136.
Full textKoutsokostas, Vasilios, and Constantinos Patsakis. "Python and Malware: Developing Stealth and Evasive Malware without Obfuscation." In 18th International Conference on Security and Cryptography. SCITEPRESS - Science and Technology Publications, 2021. http://dx.doi.org/10.5220/0010541500002998.
Full textAfreen, Asad, Moosa Aslam, and Saad Ahmed. "Analysis of Fileless Malware and its Evasive Behavior." In 2020 International Conference on Cyber Warfare and Security (ICCWS). IEEE, 2020. http://dx.doi.org/10.1109/iccws48432.2020.9292376.
Full textLim, Charles, and Nicsen. "Mal-EVE: Static detection model for evasive malware." In 2015 10th International Conference on Communications and Networking in China (ChinaCom). IEEE, 2015. http://dx.doi.org/10.1109/chinacom.2015.7497952.
Full textLiu, Tao, and Wujie Wen. "Deep-evasion: Turn deep neural network into evasive self-contained cyber-physical malware." In WiSec '19: 12th ACM Conference on Security and Privacy in Wireless and Mobile Networks. New York, NY, USA: ACM, 2019. http://dx.doi.org/10.1145/3317549.3326311.
Full textLiu, Lang, Yacong Gu, Qi Li, and Purui Su. "RealDroid: Large-Scale Evasive Malware Detection on "Real Devices"." In 2017 26th International Conference on Computer Communication and Networks (ICCCN). IEEE, 2017. http://dx.doi.org/10.1109/icccn.2017.8038419.
Full text