The quality of anti-virus software relies on simple patterns extracted from binary files. Although these patterns have proven to work on detecting the specifics of software, they are extremely sensitive to concealment strategies, such as polymorphism or metamorphism. These limitations also make anti-virus software predictable, creating a security breach. Any black hat with enough information about the anti-virus behaviour can make its own copy of the software, without any access to the original implementation or database. In this work, we show how this is indeed possible by combining entropy patterns with classification algorithms. Our results, applied to 57 different anti-virus engines, show that we can mimic their behaviour with an...
The use of anti-virus software has become something of an act of faith. A recent study showed that m...
This thesis explores what patterns, if any, exist to differentiate non-malware from malware, given o...
AbstractComputers are top-rated essential commodities to the people across the world. The main conce...
The quality of anti-virus software relies on simple patterns extracted from binary files. Although t...
Malware creators have been getting their way for too long now. String-based similarity measures can ...
Malware creators have been getting their way for too long now. String-based similarity measures can ...
The number of malicious programs has grown both in number and in sophistication. Analyzing the malic...
Malware is a serious threat in a world where IoT devices are becoming more and more pervasive; indee...
Malware concealment is the predominant strategy for malware propagation. Black hats create variants ...
In the last few years virus writers have made use of new obfuscation techniques with the aim of hind...
This dissertation explores functional malware classification using running window entropy and machin...
Computer viruses have become complex and operates in a stealth mode to avoid detection. New viruses ...
An open research problem on malware analysis is how to statically distinguish between packed and non...
Malicious software (‘malware’) detection systems are usually signature-based and cannot stop attacks...
http://www.springerlink.com/content/175414336v882211/International audienceIn this paper, we propose...
The use of anti-virus software has become something of an act of faith. A recent study showed that m...
This thesis explores what patterns, if any, exist to differentiate non-malware from malware, given o...
AbstractComputers are top-rated essential commodities to the people across the world. The main conce...
The quality of anti-virus software relies on simple patterns extracted from binary files. Although t...
Malware creators have been getting their way for too long now. String-based similarity measures can ...
Malware creators have been getting their way for too long now. String-based similarity measures can ...
The number of malicious programs has grown both in number and in sophistication. Analyzing the malic...
Malware is a serious threat in a world where IoT devices are becoming more and more pervasive; indee...
Malware concealment is the predominant strategy for malware propagation. Black hats create variants ...
In the last few years virus writers have made use of new obfuscation techniques with the aim of hind...
This dissertation explores functional malware classification using running window entropy and machin...
Computer viruses have become complex and operates in a stealth mode to avoid detection. New viruses ...
An open research problem on malware analysis is how to statically distinguish between packed and non...
Malicious software (‘malware’) detection systems are usually signature-based and cannot stop attacks...
http://www.springerlink.com/content/175414336v882211/International audienceIn this paper, we propose...
The use of anti-virus software has become something of an act of faith. A recent study showed that m...
This thesis explores what patterns, if any, exist to differentiate non-malware from malware, given o...
AbstractComputers are top-rated essential commodities to the people across the world. The main conce...