2016 6th International Conference on Computers Communications and Control (ICCCC) 2016
DOI: 10.1109/icccc.2016.7496735
|View full text |Cite
|
Sign up to set email alerts
|

Proposed classification of malware, based on obfuscation

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
9
0
3

Year Published

2017
2017
2022
2022

Publication Types

Select...
4
3

Relationship

1
6

Authors

Journals

citations
Cited by 11 publications
(12 citation statements)
references
References 2 publications
0
9
0
3
Order By: Relevance
“…The process of detecting malware through the recognition of their signatures, that these are later saved into the antivirus databases. However, through an updating process, these malware could be transformed and become undetectable without losing its functionality as it is described by Barría et al [4].…”
Section: Current Malware Updating Processmentioning
confidence: 99%
See 2 more Smart Citations
“…The process of detecting malware through the recognition of their signatures, that these are later saved into the antivirus databases. However, through an updating process, these malware could be transformed and become undetectable without losing its functionality as it is described by Barría et al [4].…”
Section: Current Malware Updating Processmentioning
confidence: 99%
“…Malware is a malicious program that provides access to a system without user's authorization and executes undesirable actions. The terms malware and virus are usually used as the same concept, although they are, in fact, different [4] [19]. Initially, the use of malware was strictly associated with the investigation and protection of software developers for intellectual property (using cryptography), but throughout time its objective changed, and therefore, its importance.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…One of the obfuscation methods is adding the dead code that alters the look of the program code. e implementation of this method is easy, but the disadvantage of this approach is that it is recognized by eliminating additional commands [2][3][4][5].…”
Section: Introductionmentioning
confidence: 99%
“…Displacement and handling of the subroutine is one obfuscation method: its advantage is that it obfuscates the source of the program code and downs the order of the subroutine. e disadvantage of this method is that the code is detected by changing the subroutine [1,2].…”
Section: Introductionmentioning
confidence: 99%