2011
DOI: 10.1109/msp.2011.98
|View full text |Cite
|
Sign up to set email alerts
|

Obfuscation: The Hidden Malware

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
95
0

Year Published

2013
2013
2023
2023

Publication Types

Select...
5
3
2

Relationship

0
10

Authors

Journals

citations
Cited by 165 publications
(95 citation statements)
references
References 4 publications
0
95
0
Order By: Relevance
“…Detection techniques proposed earlier were based on static analysis. Static analysis examines the binary code, analyzes all possible execution paths, and identifies malicious code without execution [4]. However, analyzing binary code turns out to be difficult nowadays.…”
Section: Introductionmentioning
confidence: 99%
“…Detection techniques proposed earlier were based on static analysis. Static analysis examines the binary code, analyzes all possible execution paths, and identifies malicious code without execution [4]. However, analyzing binary code turns out to be difficult nowadays.…”
Section: Introductionmentioning
confidence: 99%
“…Entropy analysis [5,16,34,36,37] is an effective technique for aiding detection of malware by pointing to the possible presence of deception techniques. Despite polymorphism or obfuscation [19], files with high entropy are more likely to have encrypted sections in them. When a PE file switches between content regimes (i.e.…”
Section: Related Workmentioning
confidence: 99%
“…Advances in malware capabilities allow same malware to have different signatures adopting polymorphism or metamorphism techniques [4,5,6]. New signatures are needed in AV software to detect the variant of the existing malware.…”
Section: New Variants Of Malwarementioning
confidence: 99%