Malware analysis with tree automata inference
CAV'11 Proceedings of the 23rd international conference on Computer aided verification
Recognizing malicious software behaviors with tree automata inference
Formal Methods in System Design
Aurasium: practical policy enforcement for Android applications
Security'12 Proceedings of the 21st USENIX conference on Security symposium
Scalable malware clustering through coarse-grained behavior modeling
Proceedings of the ACM SIGSOFT 20th International Symposium on the Foundations of Software Engineering
DiffSig: resource differentiation based malware behavioral concise signature generation
ICT-EurAsia'13 Proceedings of the 2013 international conference on Information and Communication Technology
Pirates of the search results page
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Obfuscated malware detection using API call dependency
Proceedings of the First International Conference on Security of Internet of Things
Analyzing and defending against web-based malware
ACM Computing Surveys (CSUR)
Generating Lightweight Behavioral Signature for Malware Detection in People-Centric Sensing
Wireless Personal Communications: An International Journal
Hi-index | 0.00 |
As the obfuscation is widely used by malware writers to evade antivirus scanners, so it becomes important to analyze how this technique is applied to malwares. This paper explores the malware obfuscation techniques while reviewing the encrypted, oligomorphic, polymorphic and metamorphic malwares which are able to avoid detection. Moreover, we discuss the future trends on the malware obfuscation techniques.