Malware is software that enables adversaries to execute their goals by affecting their target devices’ confidentiality, integrity, or availability. Malware is constantly evolving and detection methods must find ways to detect the new variants. This research developed a new method of detecting malware using a neural-network architecture. The method is not signature-based, unlike most existing methods, and would aid in finding previously unseen malware. It analyzes software using three separate static-analysis methods to obtain a list of features, which when input into the neural network are used to classify the software as malware or not malware. The three methods were the binary-to-grayscale, statistical-N-grams, and dynamic-link-libraries....
Abstract: malicious software also known as malware are the critical security threat experienced by t...
There exist different methods of identifying malware, and widespread method is the one found in almo...
Malware could be developed and transformed into various forms to deceive users and evade antivirus a...
There are two main components of malware analysis. One is static malware analysis and the other is d...
The persistent shortage of cybersecurity professionals combined with enterprise networks tasked with...
To ensure the protection of information processed by computer systems is currently the most importan...
Any programme or code that is damaging to our systems or networks is known as Malware or malicious s...
Malware has been one of the key concerns for Information Technology security researchers for decades...
The continuous growth in the number of malware instances has posed a serious challenge to the securi...
Malicious software poses a serious threat to the cybersecurity of network infrastructures and is a g...
The number of new malwares created every day is at an all-time high, one of the main reasons is that...
AbstractThe number of malware is increasing rapidly regardless of the common use of anti-malware sof...
My Ph.D. focuses on detecting malware by leveraging the information obtained at an instruction-level...
Cavazos, JohnBad actors have embraced automation and current malware analysis systems cannot keep up...
It is becoming increasingly harder to protect devices against security threats; as malware is steadi...
Abstract: malicious software also known as malware are the critical security threat experienced by t...
There exist different methods of identifying malware, and widespread method is the one found in almo...
Malware could be developed and transformed into various forms to deceive users and evade antivirus a...
There are two main components of malware analysis. One is static malware analysis and the other is d...
The persistent shortage of cybersecurity professionals combined with enterprise networks tasked with...
To ensure the protection of information processed by computer systems is currently the most importan...
Any programme or code that is damaging to our systems or networks is known as Malware or malicious s...
Malware has been one of the key concerns for Information Technology security researchers for decades...
The continuous growth in the number of malware instances has posed a serious challenge to the securi...
Malicious software poses a serious threat to the cybersecurity of network infrastructures and is a g...
The number of new malwares created every day is at an all-time high, one of the main reasons is that...
AbstractThe number of malware is increasing rapidly regardless of the common use of anti-malware sof...
My Ph.D. focuses on detecting malware by leveraging the information obtained at an instruction-level...
Cavazos, JohnBad actors have embraced automation and current malware analysis systems cannot keep up...
It is becoming increasingly harder to protect devices against security threats; as malware is steadi...
Abstract: malicious software also known as malware are the critical security threat experienced by t...
There exist different methods of identifying malware, and widespread method is the one found in almo...
Malware could be developed and transformed into various forms to deceive users and evade antivirus a...