“…Many studies use static analysis for malware detection using exact decompilation [16], similarity testing framework [17], based on register contents [18], using two dimensional binary program features [19], subroutine based detection [20], statistics of assembly instructions [21], file relation graphs [22], de-anonymizing programmers via code stylometry [23], based upon a wavelet package technique [24], analysis and comparison of disassemblers for opcode [25] The studies that use dynamic analysis perform synthesis the semantics of obfuscated code [7], multi-hypothesis testing [26], analyzing quantitative data flow graph metrics [27], using simplified data dependent api call graph [28], downloader graph analytics [29], access behavior [30], [31], APIs in initial behavior [32], log based crowdsourcing analysis [33] There have been many studies on the detection and analysis of malware using machine learning that study fine-grained features [34], deep learning [35], [36], dynamic features [37], static features [38], concept drift [39], predicting signatures [40], hybrid framework [41], malware metadata [42], reverse engineering of large datasets of binaries [43].…”