2016
DOI: 10.1016/j.procs.2016.02.097
|View full text |Cite
|
Sign up to set email alerts
|

Detection of Obfuscation in Java Malware

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
4
0
3

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 13 publications
(7 citation statements)
references
References 10 publications
0
4
0
3
Order By: Relevance
“…JMD [49] combines symbolic execution and instrumentation techniques with dynamic analysis to improve malware detection. Kumar et al [50] design a lexical analysis-based approach to identify code obfuscation. Recently, researchers have proposed to perform Java malware program detection by using static and dynamic analysis [11,51].…”
Section: Java Malware Detection Methodsmentioning
confidence: 99%
“…JMD [49] combines symbolic execution and instrumentation techniques with dynamic analysis to improve malware detection. Kumar et al [50] design a lexical analysis-based approach to identify code obfuscation. Recently, researchers have proposed to perform Java malware program detection by using static and dynamic analysis [11,51].…”
Section: Java Malware Detection Methodsmentioning
confidence: 99%
“…Other information will be removed from the byte code such as comments and identifiers. Programmers use this technique alone without merging it with any other technique that does not guarantee protection [2].…”
Section: Lexical Obfuscationmentioning
confidence: 99%
“…JMD [40] combines symbolic execution and instrumentation techniques with dynamic analysis to improve malware detection. Kumar et al [11] design a lexical analysis-based approach to identify code obfuscation. Recently, researchers have proposed to perform Java malware program detection by using static and dynamic analysis [13,41].…”
Section: Related Workmentioning
confidence: 99%
“…Traditional static analysis methods mainly extract syntax features such as strings or imports to identify malware samples. While syntax features achieve successful malware detection, these static approaches can be effectively evaded by obfuscation techniques [11,12]. Owning the ability of resisting code obfuscation via sandbox environment execution, dynamic analysis techniques can be easily evaded by environment-aware and event-trigger malware [13].…”
Section: Introductionmentioning
confidence: 99%