2020
DOI: 10.1016/j.fsidi.2019.200903
|View full text |Cite
|
Sign up to set email alerts
|

Imaging and evaluating the memory access for malware

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 16 publications
(8 citation statements)
references
References 15 publications
0
8
0
Order By: Relevance
“…6 exhibits dynamic malware classifier's accuracy. The authors in [4], [104],and [17] some researchers have reached more than 99 % accuracy. The authors [116] generated the highest precision of 99.…”
Section: Hybrid Malware Detectionmentioning
confidence: 97%
See 1 more Smart Citation
“…6 exhibits dynamic malware classifier's accuracy. The authors in [4], [104],and [17] some researchers have reached more than 99 % accuracy. The authors [116] generated the highest precision of 99.…”
Section: Hybrid Malware Detectionmentioning
confidence: 97%
“…This technique has a 99% accuracy rate in terms of malware identification. Yucel et al presented a techniques for creating executable memory file images [104]. A total of 123 malware samples from various families were collected.…”
Section: Behavior-based Malware Detectionmentioning
confidence: 99%
“…Memory forensic analysis can be done for various purposes such as cyber crime investigation, malware analysis, information security incident response, digital forensics, etc. [31]. The keylogging procedure on the target starts with this command.…”
Section: Figure 10 Hard Drive Storage Investigation F) Memory Forensicmentioning
confidence: 99%
“…The detection accuracy of the method reached 99.3%. In some recent studies, researchers have turned their attention to in-memory; Yucel et al [17] proposed a technique based on an in-memory image of an executable file, they used a virtual machine to execute a malware sample and created a 3D image of the memory, using the similarity calculation between 3D images and known malware to detect malware. In addition, there are some studies on exploiting the network traffic of malware [18,19] for detection.…”
Section: Related Workmentioning
confidence: 99%