To ensure the protection of information processed by computer systems is currently the most important task in the construction and operation of the automated systems. The paper presents the application justification of a new set of features distinguished at the stage of the static analysis of the executable files to address the problem of malicious code detection. In the course of study, following problems were solved: development of the executable files classifier in the absence of a priori data concerning their functionality; designing class models of uninfected files and malware during the learning process; development of malicious code detection procedure using the neural networks mathematical apparatus and decision tree composition rel...
Malicious software, sometimes known as malware, is software designed to harm a computer, network, or...
Rapid development of the internet leads the malware to become one of the most significant threads no...
Existing anti-malware products usually use signature-based techniques as their main detection engine...
Malware is software that enables adversaries to execute their goals by affecting their target device...
This BSc Thesis was performed during a study stay at the Universita della Svizzera italiana, Swiss. ...
There are two main components of malware analysis. One is static malware analysis and the other is d...
There exist different methods of identifying malware, and widespread method is the one found in almo...
Malware could be developed and transformed into various forms to deceive users and evade antivirus a...
The continuous growth in the number of malware instances has posed a serious challenge to the securi...
Static malware analysis is well-suited to endpoint anti-virus systems as it can be conducted quickly...
Malware has been one of the key concerns for Information Technology security researchers for decades...
AbstractThe number of malware is increasing rapidly regardless of the common use of anti-malware sof...
Classification of automatically generated malware is an active research area. The amount of new malw...
Based on the latest statistics, we can see a significant increase in the amount of malware on the ma...
Malware is one of the top most obstructions for expansion and growth of digital acceptance among the...
Malicious software, sometimes known as malware, is software designed to harm a computer, network, or...
Rapid development of the internet leads the malware to become one of the most significant threads no...
Existing anti-malware products usually use signature-based techniques as their main detection engine...
Malware is software that enables adversaries to execute their goals by affecting their target device...
This BSc Thesis was performed during a study stay at the Universita della Svizzera italiana, Swiss. ...
There are two main components of malware analysis. One is static malware analysis and the other is d...
There exist different methods of identifying malware, and widespread method is the one found in almo...
Malware could be developed and transformed into various forms to deceive users and evade antivirus a...
The continuous growth in the number of malware instances has posed a serious challenge to the securi...
Static malware analysis is well-suited to endpoint anti-virus systems as it can be conducted quickly...
Malware has been one of the key concerns for Information Technology security researchers for decades...
AbstractThe number of malware is increasing rapidly regardless of the common use of anti-malware sof...
Classification of automatically generated malware is an active research area. The amount of new malw...
Based on the latest statistics, we can see a significant increase in the amount of malware on the ma...
Malware is one of the top most obstructions for expansion and growth of digital acceptance among the...
Malicious software, sometimes known as malware, is software designed to harm a computer, network, or...
Rapid development of the internet leads the malware to become one of the most significant threads no...
Existing anti-malware products usually use signature-based techniques as their main detection engine...