Добірка наукової літератури з теми "Evasive malware"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся зі списками актуальних статей, книг, дисертацій, тез та інших наукових джерел на тему "Evasive malware".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Статті в журналах з теми "Evasive malware"
Gruber, Jan, and Felix Freiling. "Fighting Evasive Malware." Datenschutz und Datensicherheit - DuD 46, no. 5 (May 2022): 284–90. http://dx.doi.org/10.1007/s11623-022-1604-9.
Повний текст джерелаEgitmen, Alper, Irfan Bulut, R. Can Aygun, A. Bilge Gunduz, Omer Seyrekbasan, and A. Gokhan Yavuz. "Combat Mobile Evasive Malware via Skip-Gram-Based Malware Detection." Security and Communication Networks 2020 (April 20, 2020): 1–10. http://dx.doi.org/10.1155/2020/6726147.
Повний текст джерелаVidyarthi, Deepti, S. P. Choudhary, Subrata Rakshit, and C. R. S. Kumar. "Malware Detection by Static Checking and Dynamic Analysis of Executables." International Journal of Information Security and Privacy 11, no. 3 (July 2017): 29–41. http://dx.doi.org/10.4018/ijisp.2017070103.
Повний текст джерелаKrishna, T. Shiva Rama. "Malware Detection using Deep Learning." International Journal for Research in Applied Science and Engineering Technology 9, no. VI (June 20, 2021): 1847–53. http://dx.doi.org/10.22214/ijraset.2021.35426.
Повний текст джерелаD'Elia, Daniele Cono, Emilio Coppa, Federico Palmaro, and Lorenzo Cavallaro. "On the Dissection of Evasive Malware." IEEE Transactions on Information Forensics and Security 15 (2020): 2750–65. http://dx.doi.org/10.1109/tifs.2020.2976559.
Повний текст джерелаCara, Fabrizio, Michele Scalas, Giorgio Giacinto, and Davide Maiorca. "On the Feasibility of Adversarial Sample Creation Using the Android System API." Information 11, no. 9 (September 10, 2020): 433. http://dx.doi.org/10.3390/info11090433.
Повний текст джерелаMills, Alan, and Phil Legg. "Investigating Anti-Evasion Malware Triggers Using Automated Sandbox Reconfiguration Techniques." Journal of Cybersecurity and Privacy 1, no. 1 (November 20, 2020): 19–39. http://dx.doi.org/10.3390/jcp1010003.
Повний текст джерелаIlić, Slaviša, Milan Gnjatović, Brankica Popović, and Nemanja Maček. "A pilot comparative analysis of the Cuckoo and Drakvuf sandboxes: An end-user perspective." Vojnotehnicki glasnik 70, no. 2 (2022): 372–92. http://dx.doi.org/10.5937/vojtehg70-36196.
Повний текст джерелаDjufri, Faiz Iman, and Charles Lim. "Revealing and Sharing Malware Profile Using Malware Threat Intelligence Platform." ACMIT Proceedings 6, no. 1 (July 6, 2021): 72–82. http://dx.doi.org/10.33555/acmit.v6i1.100.
Повний текст джерелаKawakoya, Yuhei, Eitaro Shioji, Makoto Iwamura, and Jun Miyoshi. "API Chaser: Taint-Assisted Sandbox for Evasive Malware Analysis." Journal of Information Processing 27 (2019): 297–314. http://dx.doi.org/10.2197/ipsjjip.27.297.
Повний текст джерелаДисертації з теми "Evasive malware"
Nisi, Dario. "Unveiling and mitigating common pitfalls in malware analysis." Electronic Thesis or Diss., Sorbonne université, 2021. http://www.theses.fr/2021SORUS528.
Повний текст джерелаAs the importance of computer systems in modern-day societies grows, so does the damage that malicious software causes. The security industry and malware authors engaged in an arms race, in which the first creates better detection systems while the second try to evade them. In fact, any wrong assumption (no matter how subtle) in the design of an anti-malware tool may create new avenues for evading detection. This thesis focuses on two often overlooked aspects of modern malware analysis techniques: the use of API-level information to encode malicious behavior and the reimplementation of parsing routines for executable file formats in security-oriented tools. We show that taking advantage of these practices is possible on a large and automated scale. Moreover, we study the feasibility of fixing these problems at their roots, measuring the difficulties that anti-malware architects may encounter and providing strategies to solve them
Lu, Gen. "Analysis of Evasion Techniques in Web-based Malware." Diss., The University of Arizona, 2013. http://hdl.handle.net/10150/312567.
Повний текст джерелаHaffejee, Jameel. "An analysis of malware evasion techniques against modern AV engines." Thesis, Rhodes University, 2015. http://hdl.handle.net/10962/5821.
Повний текст джерелаSidor, Samuel. "Vylepšený sandboxing pro pokročilé kmeny malwaru." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2021. http://www.nusl.cz/ntk/nusl-442403.
Повний текст джерелаLi, Hao, and 李昊. "Guided Execution Path Exploration for Evasive Malware Analysis." Thesis, 2018. http://ndltd.ncl.edu.tw/handle/s63mm6.
Повний текст джерела國立交通大學
資訊科學與工程研究所
106
In recent years, malware has become a severe problem on the Internet. Modern malware is often equipped with evasion techniques to prevent itself from being analyzed by sandbox-based analysis. To fight against evasive malware, analysts need to trigger the deliberately hidden malicious behaviors by execution path exploration. Nonetheless, currently the common methods for path exploration suffer from the path explosion problem and is hard to exhaust all paths. In this thesis, we proposed an approach to guiding the execution paths exploration toward the most suspicious execution paths in order to reach the hidden malicious behaviors in limited time. We learned the patterns of malicious behaviors and evasion techniques from malware in the wild and evasion techniques commonly used by malware authors. By analyzing the potential behaviors and the prerequisites of paths in the samples, our analysis systems can trigger the hidden behaviors faster to enable the analysts to process evasive malware samples. As indicated in the experiments, our approach can discover the hidden behaviors faster with fewer paths explored where time consumption of the analysis is reduced to 89%.
Chen, Ting-Wen, and 陳鼎文. "Automatic Sourcing for Symbolic Execution in Evasive Malware Analysis." Thesis, 2016. http://ndltd.ncl.edu.tw/handle/66689369422897880085.
Повний текст джерелаZhang, Nian-Zu, and 張念祖. "A Study on Evasion Techniques of Anti-Analysis Malware by Examples." Thesis, 2015. http://ndltd.ncl.edu.tw/handle/sa6mw9.
Повний текст джерела健行科技大學
資訊工程系碩士班
103
There are a large number of unknown malware sample recently. However, computer technology has not been developed in the past decade. It was told that quantity does not equal quality. But the quality of malware is improving with time. All kinds of anti-analysis technology is to conflict with information security personnel. Actually, samples analyze by manual analysis is inefficient. Besides, there have Anti-Analysis technology to disturb analysts, Because of that, there is an Automated Malware Analysis System to against them(Hereinafter referred to as SandBox). It not only have a environment that can be controlled and have monitor and collect sample modules, but also have static analysis, and the most important modules that can trigger samples. This system improve the efficiency of the analyzed sample and this is the best way to analyze sample until now. “While the priest climbs a post, the devil climbs ten”, malware developer start to develop Anti-SandBox technology. It will stop doing malicious behavior as soon as it detect there is a SandBox .Of course, SandBox can not detect suspicious information. This paper aims to study Anti-Sanbox or Anti-VM mechanism try to use existing SandBox technology for analysing malware, and find how the malware can avoide SandBox caught and identifying current running on what kind of SandBox software Finally, the experiment will out of into a single software technology, provding the user free with this technology for investigating SandBox environment.
Ersan, Erkan. "On the (in)security of behavioral-based dynamic anti-malware techniques." Thesis, 2017. http://hdl.handle.net/1828/7935.
Повний текст джерелаGraduate
2018-02-07
0984
erkanersan@gmail.com
Частини книг з теми "Evasive malware"
Tanabe, Rui, Wataru Ueno, Kou Ishii, Katsunari Yoshioka, Tsutomu Matsumoto, Takahiro Kasama, Daisuke Inoue, and Christian Rossow. "Evasive Malware via Identifier Implanting." In Detection of Intrusions and Malware, and Vulnerability Assessment, 162–84. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-93411-2_8.
Повний текст джерелаHăjmăşan, Gheorghe, Alexandra Mondoc, Radu Portase, and Octavian Creţ. "Evasive Malware Detection Using Groups of Processes." In ICT Systems Security and Privacy Protection, 32–45. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-58469-0_3.
Повний текст джерелаKang, Min Gyung, Juan Caballero, and Dawn Song. "Distributed Evasive Scan Techniques and Countermeasures." In Detection of Intrusions and Malware, and Vulnerability Assessment, 157–74. Berlin, Heidelberg: Springer Berlin Heidelberg, 2007. http://dx.doi.org/10.1007/978-3-540-73614-1_10.
Повний текст джерелаMohanta, Abhijit, and Anoop Saldanha. "Armoring and Evasion: The Anti-Techniques." In Malware Analysis and Detection Engineering, 691–720. Berkeley, CA: Apress, 2020. http://dx.doi.org/10.1007/978-1-4842-6193-4_19.
Повний текст джерелаRoyo, Álvaro Arribas, Manuel Sánchez Rubio, Walter Fuertes, Mauro Callejas Cuervo, Carlos Andrés Estrada, and Theofilos Toulkeridis. "Malware Security Evasion Techniques: An Original Keylogger Implementation." In Advances in Intelligent Systems and Computing, 375–84. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-72657-7_36.
Повний текст джерелаLeguesse, Yonas, Mark Vella, and Joshua Ellul. "AndroNeo: Hardening Android Malware Sandboxes by Predicting Evasion Heuristics." In Information Security Theory and Practice, 140–52. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-93524-9_9.
Повний текст джерелаBiondi, Fabrizio, Thomas Given-Wilson, Axel Legay, Cassius Puodzius, and Jean Quilbeuf. "Tutorial: An Overview of Malware Detection and Evasion Techniques." In Leveraging Applications of Formal Methods, Verification and Validation. Modeling, 565–86. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-03418-4_34.
Повний текст джерелаYamamoto, Risa, and Mamoru Mimura. "On the Possibility of Evasion Attacks with Macro Malware." In Advances in Intelligent Systems and Computing, 43–59. Singapore: Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-16-5301-8_4.
Повний текст джерелаYokoyama, Akira, Kou Ishii, Rui Tanabe, Yinmin Papa, Katsunari Yoshioka, Tsutomu Matsumoto, Takahiro Kasama, et al. "SandPrint: Fingerprinting Malware Sandboxes to Provide Intelligence for Sandbox Evasion." In Research in Attacks, Intrusions, and Defenses, 165–87. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-45719-2_8.
Повний текст джерелаChen, Lingwei, Shifu Hou, Yanfang Ye, and Lifei Chen. "An Adversarial Machine Learning Model Against Android Malware Evasion Attacks." In Web and Big Data, 43–55. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-69781-9_5.
Повний текст джерелаТези доповідей конференцій з теми "Evasive malware"
Borders, K., Xin Zhao, and A. Prakash. "Siren: catching evasive malware." In 2006 IEEE Symposium on Security and Privacy. IEEE, 2006. http://dx.doi.org/10.1109/sp.2006.37.
Повний текст джерелаBotacin, Marcus, Vitor Falcão da Rocha, Paulo Lício de Geus, and André Grégio. "Analysis, Anti-Analysis, Anti-Anti-Analysis: An Overview of the Evasive Malware Scenario." In Simpósio Brasileiro de Segurança da Informação e de Sistemas Computacionais. Sociedade Brasileira de Computação - SBC, 2017. http://dx.doi.org/10.5753/sbseg.2017.19504.
Повний текст джерелаZhang, Jialong, Zhongshu Gu, Jiyong Jang, Dhilung Kirat, Marc Stoecklin, Xiaokui Shu, and Heqing Huang. "Scarecrow: Deactivating Evasive Malware via Its Own Evasive Logic." In 2020 50th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN). IEEE, 2020. http://dx.doi.org/10.1109/dsn48063.2020.00027.
Повний текст джерелаNicho, Mathew, and Maitha Alkhateri. "Modeling Evasive Malware Authoring Techniques." In 2021 5th Cyber Security in Networking Conference (CSNet). IEEE, 2021. http://dx.doi.org/10.1109/csnet52717.2021.9614645.
Повний текст джерелаKoutsokostas, Vasilios, and Constantinos Patsakis. "Python and Malware: Developing Stealth and Evasive Malware without Obfuscation." In 18th International Conference on Security and Cryptography. SCITEPRESS - Science and Technology Publications, 2021. http://dx.doi.org/10.5220/0010541501250136.
Повний текст джерелаKoutsokostas, Vasilios, and Constantinos Patsakis. "Python and Malware: Developing Stealth and Evasive Malware without Obfuscation." In 18th International Conference on Security and Cryptography. SCITEPRESS - Science and Technology Publications, 2021. http://dx.doi.org/10.5220/0010541500002998.
Повний текст джерелаAfreen, Asad, Moosa Aslam, and Saad Ahmed. "Analysis of Fileless Malware and its Evasive Behavior." In 2020 International Conference on Cyber Warfare and Security (ICCWS). IEEE, 2020. http://dx.doi.org/10.1109/iccws48432.2020.9292376.
Повний текст джерелаLim, Charles, and Nicsen. "Mal-EVE: Static detection model for evasive malware." In 2015 10th International Conference on Communications and Networking in China (ChinaCom). IEEE, 2015. http://dx.doi.org/10.1109/chinacom.2015.7497952.
Повний текст джерелаLiu, Tao, and Wujie Wen. "Deep-evasion: Turn deep neural network into evasive self-contained cyber-physical malware." In WiSec '19: 12th ACM Conference on Security and Privacy in Wireless and Mobile Networks. New York, NY, USA: ACM, 2019. http://dx.doi.org/10.1145/3317549.3326311.
Повний текст джерелаLiu, Lang, Yacong Gu, Qi Li, and Purui Su. "RealDroid: Large-Scale Evasive Malware Detection on "Real Devices"." In 2017 26th International Conference on Computer Communication and Networks (ICCCN). IEEE, 2017. http://dx.doi.org/10.1109/icccn.2017.8038419.
Повний текст джерела