scispace - formally typeset
S

Shahid Alam

Researcher at Adana Science and Technology University

Publications -  26
Citations -  414

Shahid Alam is an academic researcher from Adana Science and Technology University. The author has contributed to research in topics: Malware & Android (operating system). The author has an hindex of 9, co-authored 26 publications receiving 329 citations. Previous affiliations of Shahid Alam include Gebze Institute of Technology & Northwestern University.

Papers
More filters
Journal ArticleDOI

DroidNative: Automating and optimizing detection of Android native code malware variants

TL;DR: DroidNative is the first system that builds cross-platform (x86 and ARM) semantic-based signatures at the Android native code level, allowing the system to detect malware embedded in either bytecode or native code.
Journal ArticleDOI

A framework for metamorphic malware analysis and real-time detection

TL;DR: A new framework called MARD is presented, to protect the end points that are often the last defense, against metamorphic malware, and provides automation, platform independence, optimizations for real-time performance and modularity.
Journal ArticleDOI

Annotated Control Flow Graph for Metamorphic Malware Detection

TL;DR: Annotated Control Flow Graph (ACFG) is presented, which captures the control flow semantics of a program and provides a faster matching of ACFGs and can handle malware with smaller CFGs, compared with other such techniques, without compromising the accuracy.
Proceedings ArticleDOI

MARD: A Framework for Metamorphic Malware Analysis and Real-Time Detection

TL;DR: A new framework called MARD for Metamorphic Malware Analysis and Real-Time Detection, to protect the end points that are often the last defense, against metamorphic malware, and presents a comparison of MARD with other such recent efforts.
Proceedings ArticleDOI

MAIL: Malware Analysis Intermediate Language: a step towards automating and optimizing malware detection

TL;DR: A new language named MAIL (Malware Analysis Intermediate Language) is introduced to automate and optimize the analysis and detection process of dynamic binary obfuscation or metamorphism.