2023
DOI: 10.1007/978-3-031-42430-4_5
|View full text |Cite
|
Sign up to set email alerts
|

Obfuscated Malware Detection: Impacts on Detection Methods

Nor Zakiah Gorment,
Ali Selamat,
Ondrej Krejcar
Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(3 citation statements)
references
References 19 publications
0
3
0
Order By: Relevance
“…These sophisticated adversaries deploy evasion techniques with unparalleled finesse, seeking to cloak their true identities and activities within the vast expanse of digital operations. Obfuscated malware achieves this by employing a myriad of tactics, including code encryption, polymorphic behavior, and other obfuscation techniques that challenge traditional signature-based detection systems (Dang 2024;Gorment et al 2023).…”
Section: Background Of Obfuscated Malware In Memory Dumpsmentioning
confidence: 99%
See 1 more Smart Citation
“…These sophisticated adversaries deploy evasion techniques with unparalleled finesse, seeking to cloak their true identities and activities within the vast expanse of digital operations. Obfuscated malware achieves this by employing a myriad of tactics, including code encryption, polymorphic behavior, and other obfuscation techniques that challenge traditional signature-based detection systems (Dang 2024;Gorment et al 2023).…”
Section: Background Of Obfuscated Malware In Memory Dumpsmentioning
confidence: 99%
“…Addressing the challenge of obfuscated malware detection is imperative in the current digital ecosystem, where reliance on technology is at an all-time high (Gorment et al 2023). In an era where data is the new currency and digital interactions underpin the majority of our daily activities, the potential impact of malware intrusions is vast and multifaceted.…”
Section: Introductionmentioning
confidence: 99%
“…In stark contrast, malicious samples frequently exhibit a conspicuous paucity of comments. The rationale underpinning this lies in attackers intentionally eschewing explanations, a tactical maneuver designed to obfuscate analysis and augment the complexity for researchers endeavoring to discern their objectives [46].…”
Section:  F83 (Comment Ratio)mentioning
confidence: 99%