scispace - formally typeset
Journal ArticleDOI

A framework for metamorphic malware analysis and real-time detection

TLDR
A new framework called MARD is presented, to protect the end points that are often the last defense, against metamorphic malware, and provides automation, platform independence, optimizations for real-time performance and modularity.
About
This article is published in Computers & Security.The article was published on 2015-02-01. It has received 80 citations till now. The article focuses on the topics: Malware analysis & Malware.

read more

Citations
More filters

Tools and Algorithms for the Construction and Analysis of Systems. Proc. TACAS 2009

TL;DR: This paper presents a meta-modelling framework for modeling and testing the robustness of the modeled systems and some of the techniques used in this framework have been developed and tested in the field.
Journal ArticleDOI

A Comprehensive Review on Malware Detection Approaches

TL;DR: This paper presents a detailed review on malware detection approaches and recent detection methods which use these approaches, and the pros and cons of each detection approach, and methods that are used in these approaches.
Journal ArticleDOI

DTB-IDS: an intrusion detection system based on decision tree using behavior analysis for preventing APT attacks

TL;DR: An intrusion detection system based on the decision tree using analysis of behavior information to detect APT attacks that intellectually change after intrusion into a system is proposed.
Journal ArticleDOI

A survey on machine learning-based malware detection in executable files

TL;DR: Detailed study of malware detection techniques using machine learning algorithms are presented and various challenges for developing malware classifiers are discussed to develop an effective malware detection system by handling various issues in malware detection.
Proceedings ArticleDOI

Adversarial Learning Attacks on Graph-based IoT Malware Detection Systems

TL;DR: The findings of this work highlight the essential need for more robust detection tools against adversarial learning, including features that are not easy to manipulate, unlike CFG-based features.
References
More filters
Book

Computers and Intractability: A Guide to the Theory of NP-Completeness

TL;DR: The second edition of a quarterly column as discussed by the authors provides a continuing update to the list of problems (NP-complete and harder) presented by M. R. Garey and myself in our book "Computers and Intractability: A Guide to the Theory of NP-Completeness,” W. H. Freeman & Co., San Francisco, 1979.
Book

Introduction to Algorithms

TL;DR: The updated new edition of the classic Introduction to Algorithms is intended primarily for use in undergraduate or graduate courses in algorithms or data structures and presents a rich variety of algorithms and covers them in considerable depth while making their design and analysis accessible to all levels of readers.
Journal ArticleDOI

The WEKA data mining software: an update

TL;DR: This paper provides an introduction to the WEKA workbench, reviews the history of the project, and, in light of the recent 3.6 stable release, briefly discusses what has been added since the last stable version (Weka 3.4) released in 2003.
Related Papers (5)