2020
DOI: 10.1088/1742-6596/1529/2/022097
|View full text |Cite
|
Sign up to set email alerts
|

Malware Behaviour Analysis and Classification via Windows DLL and System Call

Abstract: Malware is refers to programs that purposely exploit computer systems’ vulnerabilities for harmful purposes. It may be categorized by identifying whether it needs a host program to function and whether it makes copies of itself. Malware is an instance of malicious code with the purpose to disrupt the function of system and has potential to destruct a computer or network [1]. Nowadays, computer malware has become more sophisticated, using advanced code obfuscation technique to resist antivirus detection. Classi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
1
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 4 publications
0
1
0
Order By: Relevance
“…In computing, all objects have attributes that can be used to develop a custom signature. Signature-based analysis refers to detecting attacks by searching for specific patterns, like byte sequences in network traffic or known malicious instruction sequences used by malware [22]. This terminology is derived from anti-virus software, which refers to these detected patterns as signatures.…”
Section: Behavior-based and Flow-based Featuresmentioning
confidence: 99%
“…In computing, all objects have attributes that can be used to develop a custom signature. Signature-based analysis refers to detecting attacks by searching for specific patterns, like byte sequences in network traffic or known malicious instruction sequences used by malware [22]. This terminology is derived from anti-virus software, which refers to these detected patterns as signatures.…”
Section: Behavior-based and Flow-based Featuresmentioning
confidence: 99%
“…DLL calls analysis, on the other hand, focuses on monitoring the behavior of executables during runtime, observing the DLLs they load and the functions they call. Unusual DLL activity, API hooking, and behavioral anomalies are key indicators of potential malware [7].…”
Section: Introductionmentioning
confidence: 99%