2023
DOI: 10.1007/s10207-023-00759-y
|View full text |Cite
|
Sign up to set email alerts
|

A survey on run-time packers and mitigation techniques

Ehab Alkhateeb,
Ali Ghorbani,
Arash Habibi Lashkari
Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
3
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
2

Relationship

1
1

Authors

Journals

citations
Cited by 2 publications
(3 citation statements)
references
References 72 publications
0
3
0
Order By: Relevance
“…In Figure 7, we utilized the dataset as described in [46], sourced from two distinct origins. The first source consisted of online/benign samples, totaling 2162 samples, representing applications downloaded from the Softpedia website and then manually packed.…”
Section: Dataset Preparationmentioning
confidence: 99%
See 2 more Smart Citations
“…In Figure 7, we utilized the dataset as described in [46], sourced from two distinct origins. The first source consisted of online/benign samples, totaling 2162 samples, representing applications downloaded from the Softpedia website and then manually packed.…”
Section: Dataset Preparationmentioning
confidence: 99%
“…Refer to Table 3 for a detailed breakdown of each benign category and the corresponding sample counts. Additionally, Table 4 showcases the packed samples, focusing on the most popular packers used by malware authors, as reported in [46]. The malware samples used in this experiment were classed based on the packer's family using two signature-based detection repositories.…”
Section: Benign Samplesmentioning
confidence: 99%
See 1 more Smart Citation