Analysis of known and unknown malware bypassing techniques
Nowadays, malware attacks are the most expensive damages for organizations in different types of computer and network systems. While different types of attacks are well surveyed and documented, little details related to bypass malware detections and defenses are provided in the public domains. Malw...
| Main Authors: | Daryabar, Farid, Dehghantanha, Ali, Udzir, Nur Izura, Mohd Sani, Nor Fazlida, Shamsuddin, Solahuddin, Norouzizadeh, Farhood |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Advanced Institute of Convergence Information Technology
2013
|
| Online Access: | http://psasir.upm.edu.my/id/eprint/30589/ http://psasir.upm.edu.my/id/eprint/30589/1/Analysis%20of%20known%20and%20unknown%20malware%20bypassing%20techniques.pdf |
Similar Items
Investigation of bypassing malware defences and malware detections
by: Daryabar, Farid, et al.
Published: (2011)
by: Daryabar, Farid, et al.
Published: (2011)
A survey about impacts of cloud computing on digital forensics
by: Daryabar, Farid, et al.
Published: (2013)
by: Daryabar, Farid, et al.
Published: (2013)
A survey on privacy impacts of digital investigation
by: Daryabar, Farid, et al.
Published: (2013)
by: Daryabar, Farid, et al.
Published: (2013)
Towards secure model for SCADA systems
by: Daryabar, Farid, et al.
Published: (2012)
by: Daryabar, Farid, et al.
Published: (2012)
Digital forensics trends and future
by: Dezfoli, Farhood Norouzizadeh, et al.
Published: (2013)
by: Dezfoli, Farhood Norouzizadeh, et al.
Published: (2013)
A data-centric model for smartphone security
by: Dezfouli, Farhood Norouzizadeh, et al.
Published: (2013)
by: Dezfouli, Farhood Norouzizadeh, et al.
Published: (2013)
Volatile memory acquisition using backup for forensic investigation
by: Dezfouli, Farhood Norouzizadeh, et al.
Published: (2012)
by: Dezfouli, Farhood Norouzizadeh, et al.
Published: (2012)
The Holocene history of the North American Monsoon: 'known knowns' and 'known unknowns' in understanding its spatial and temporal complexity
by: Metcalfe, Sarah E., et al.
Published: (2015)
by: Metcalfe, Sarah E., et al.
Published: (2015)
A survey on malware propagation, analysis, and detection
by: Damshenas, Mohsen, et al.
Published: (2013)
by: Damshenas, Mohsen, et al.
Published: (2013)
Short review on metamorphic malware detection in Hidden Markov Models
by: Yeong, T. Ling, et al.
Published: (2017)
by: Yeong, T. Ling, et al.
Published: (2017)
Nonnegative matrix factorization and metamorphic malware detection
by: Ling, Yeong Tyng, et al.
Published: (2019)
by: Ling, Yeong Tyng, et al.
Published: (2019)
Analytical method for forensic investigation of social networking applications on smartphones
by: Dezfouli, Farhood Norouzizadeh
Published: (2016)
by: Dezfouli, Farhood Norouzizadeh
Published: (2016)
Techniques for analysing android malware
by: Adebayo, Olawale Surajudeen, et al.
Published: (2014)
by: Adebayo, Olawale Surajudeen, et al.
Published: (2014)
Comparative analysis and how efficient deep learning methods of malware detection
by: Mustapha, Norwati, et al.
Published: (2024)
by: Mustapha, Norwati, et al.
Published: (2024)
The Rise of “malware”: Bibliometric Analysis of Malware Study
by: Mohd Faizal, Ab Razak, et al.
Published: (2016)
by: Mohd Faizal, Ab Razak, et al.
Published: (2016)
Review of hybrid analysis technique for malware detection
by: Yus Kamalrul, Mohamed Yunus, et al.
Published: (2020)
by: Yus Kamalrul, Mohamed Yunus, et al.
Published: (2020)
Structural features with nonnegative matrix factorization for metamorphic malware detection
by: Yeong, Tyng Ling, et al.
Published: (2021)
by: Yeong, Tyng Ling, et al.
Published: (2021)
Android: S-Based Technique in Mobile Malware Detection
by: Rahiwan Nazar, Romli, et al.
Published: (2018)
by: Rahiwan Nazar, Romli, et al.
Published: (2018)
The trend of mobile malwares and effective detection techniques
by: Abdul Aziz, Normaziah, et al.
Published: (2015)
by: Abdul Aziz, Normaziah, et al.
Published: (2015)
Malware detection through machine learning techniques
by: Amer, Ahmed, et al.
Published: (2019)
by: Amer, Ahmed, et al.
Published: (2019)
A review : Static analysis of android malware and detection technique
by: Juliza, Mohamad Arif, et al.
Published: (2021)
by: Juliza, Mohamad Arif, et al.
Published: (2021)
Metamorphic malware detection using structural features and nonnegative matrix factorization with hidden markov model
by: Ling, Yeong Tyng, et al.
Published: (2021)
by: Ling, Yeong Tyng, et al.
Published: (2021)
A XML based, user-centered privacy model in pervasive
computing systems
by: Dehghantanha, Ali, et al.
Published: (2009)
by: Dehghantanha, Ali, et al.
Published: (2009)
Towards green frameworks for digital forensics investigation
by: Dehghantanha, Ali, et al.
Published: (2013)
by: Dehghantanha, Ali, et al.
Published: (2013)
Towards data centric mobile security
by: Dehghantanha, Ali, et al.
Published: (2011)
by: Dehghantanha, Ali, et al.
Published: (2011)
Features, Analysis Techniques, and Detection Methods of Cryptojacking Malware: A Survey
by: Kadhum, Laith M., et al.
Published: (2024)
by: Kadhum, Laith M., et al.
Published: (2024)
A New Generic Taxonomy on Hybrid Malware Detection Technique
by: Yusof, R., et al.
Published: (2009)
by: Yusof, R., et al.
Published: (2009)
Numerical Techniques for Determining Unknown
Parameters in Option Pricing
by: Nabubie Ibrahim, Bashiruddin
Published: (2022)
by: Nabubie Ibrahim, Bashiruddin
Published: (2022)
Malware Analysis with Multiple Features
by: Ahmad Zabidi, Muhammad Najmi, et al.
Published: (2012)
by: Ahmad Zabidi, Muhammad Najmi, et al.
Published: (2012)
Early experience with distal bypass for weight regain after Roux-en-Y gastric bypass
by: Nor Hanipah, Zubaidah, et al.
Published: (2016)
by: Nor Hanipah, Zubaidah, et al.
Published: (2016)
A formal verification and simulation of Common Criteria Recognition Arrangement (CCRA)
by: Mat Isa, Mohd Anuar, et al.
Published: (2017)
by: Mat Isa, Mohd Anuar, et al.
Published: (2017)
Malware visualizer: A web apps malware family classification with machine learning
by: Mohd Zamri, Osman, et al.
Published: (2021)
by: Mohd Zamri, Osman, et al.
Published: (2021)
Malware mobile devices in Indonesia
by: Drajad, Wiryawan, et al.
Published: (2019)
by: Drajad, Wiryawan, et al.
Published: (2019)
Permission extraction framework for android malware detection
by: Ghasempour, Ali
Published: (2019)
by: Ghasempour, Ali
Published: (2019)
Cyber warfare trends and future
by: Ganji, Majid, et al.
Published: (2013)
by: Ganji, Majid, et al.
Published: (2013)
Digital forensics framework for investigating client cloud storage applications on smartphones
by: Daryabar, Farid
Published: (2015)
by: Daryabar, Farid
Published: (2015)
Bypass grafting operations using conventional technique with off-pump coronary artery bypass grafting in two identical groups conducted at the Penang Hospital (1999-2000)
by: Kasinathan, Vasantha
Published: (2001)
by: Kasinathan, Vasantha
Published: (2001)
Forensic investigation of OneDrive, Box, GoogleDrive and Dropbox applications on Android and iOS devices
by: Daryabar, Farid, et al.
Published: (2016)
by: Daryabar, Farid, et al.
Published: (2016)
Maldroid- attribute selection analysis for malware classification
by: Rahiwan Nazar, Romli, et al.
Published: (2019)
by: Rahiwan Nazar, Romli, et al.
Published: (2019)
SCARECROW: scalable malware reporting, detection and analysis
by: Barakat, Osamah Lutf Hamood, et al.
Published: (2013)
by: Barakat, Osamah Lutf Hamood, et al.
Published: (2013)
Similar Items
-
Investigation of bypassing malware defences and malware detections
by: Daryabar, Farid, et al.
Published: (2011) -
A survey about impacts of cloud computing on digital forensics
by: Daryabar, Farid, et al.
Published: (2013) -
A survey on privacy impacts of digital investigation
by: Daryabar, Farid, et al.
Published: (2013) -
Towards secure model for SCADA systems
by: Daryabar, Farid, et al.
Published: (2012) -
Digital forensics trends and future
by: Dezfoli, Farhood Norouzizadeh, et al.
Published: (2013)