Since malwares contain stalling codes, malicious behaviors can’t be detected in emulated analysis environment. This paper proposes an approach to detect malicious behaviors by evade stalling codes. First, we executed a malware in the emulated analysis environment, and saved every executed instruction in a trace file; Second, we began to detect stalling codes with the trace file, and constructed stalling code evasive points; At last, we executed the malware again and evade stalling codes with the evasive points, and then the malicious behaviors detected. It has been proven by experiments that the approach can evade stalling codes to detect the later malware behaviors effectively, and improve the performance of detecting the malicious behavio...
In contrast to most benign applications, malware infects its host system. It does so via system-wide...
Malicious code detection is a crucial component of any defense mechanism. In this paper, we present ...
Best Paper AwardInternational audienceAndroid malware authors use sophisticated techniques to hide t...
Malware continues to remain one of the most important security problems on the Internet today. Whene...
Malware are become increasingly aware of their execution environment. In order to avoid detection by...
Malware is the root cause of many security threats on the Internet. To cope with the thousands of ne...
Abstract—To handle the growing flood of malware, security vendors and analysts rely on tools that au...
Abstract. We present an approach for proactive malware detection working by abstraction of program b...
International audienceWe present an approach for proactive malware detection by working on an abstra...
Malicious software (malware) has a wide variety of analysis avoidance techniques that it can employ ...
Anti-debugging technology refers to various ways of preventing binary files from being analyzed in d...
Recent progress in machine learning has led to promising results in behavioral malware detection. Be...
Recently, malware has become more abundant and complex as the Internet has become more widely used i...
Part 2: Malware DetectionInternational audienceMalware is substantial security threat today and most...
Recent progress in machine learning has led to promising results in behavioral malware detection. Be...
In contrast to most benign applications, malware infects its host system. It does so via system-wide...
Malicious code detection is a crucial component of any defense mechanism. In this paper, we present ...
Best Paper AwardInternational audienceAndroid malware authors use sophisticated techniques to hide t...
Malware continues to remain one of the most important security problems on the Internet today. Whene...
Malware are become increasingly aware of their execution environment. In order to avoid detection by...
Malware is the root cause of many security threats on the Internet. To cope with the thousands of ne...
Abstract—To handle the growing flood of malware, security vendors and analysts rely on tools that au...
Abstract. We present an approach for proactive malware detection working by abstraction of program b...
International audienceWe present an approach for proactive malware detection by working on an abstra...
Malicious software (malware) has a wide variety of analysis avoidance techniques that it can employ ...
Anti-debugging technology refers to various ways of preventing binary files from being analyzed in d...
Recent progress in machine learning has led to promising results in behavioral malware detection. Be...
Recently, malware has become more abundant and complex as the Internet has become more widely used i...
Part 2: Malware DetectionInternational audienceMalware is substantial security threat today and most...
Recent progress in machine learning has led to promising results in behavioral malware detection. Be...
In contrast to most benign applications, malware infects its host system. It does so via system-wide...
Malicious code detection is a crucial component of any defense mechanism. In this paper, we present ...
Best Paper AwardInternational audienceAndroid malware authors use sophisticated techniques to hide t...