2022
DOI: 10.1016/j.jisa.2022.103258
|View full text |Cite
|
Sign up to set email alerts
|

On the effectiveness of binary emulation in malware classification

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
3

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(1 citation statement)
references
References 30 publications
0
1
0
Order By: Relevance
“…In this case, the code of suspicious software is "decompiled", and analyzed in parts. In the case of scanning, the analyzer emulates a virus acting within a certain instruction (Vouvoutsis et al, 2022). A checksum is then determined.…”
Section: Literature Reviewmentioning
confidence: 99%
“…In this case, the code of suspicious software is "decompiled", and analyzed in parts. In the case of scanning, the analyzer emulates a virus acting within a certain instruction (Vouvoutsis et al, 2022). A checksum is then determined.…”
Section: Literature Reviewmentioning
confidence: 99%