API call hooking is a technique that malware researchers use to mine malware's API calls. These API calls is used to represent malware's behavior, for use in malware analysis, classification or detection of samples. In this paper, analysis of current Windows API call hooking techniques is presented where surprisingly, it was found that detection of each technique can be done trivially in memory. This could lead to malware being able to sense the presence of API call hooking techniques and modifying their behavior during runtime. Suggestions for a better API call hooking technique are presented towards the end of the paper
The widespread development of the malware industry is considered the main threat to our e-society. T...
The proliferation of malware (viruses, Trojans, and other malicious code) in recent years has presen...
Recently, most researchers have employed behaviour based detection systems to classify Portable Exec...
An open research question in malware detection is how to accurately and reliably distinguish a malwa...
One of the recent trends adopted by malware authors is to use packers or software tools that instiga...
Advancements in malware development, including the use of file-less and memory-only payloads, have l...
The proper interpretation of the malware API call sequence plays a crucial role in identifying its m...
In the era of ubiquitous sensors and smart devices, detecting malware is becoming an endless battle ...
Malware is a major security threat confronting computer systems and networks and has increased in sc...
In this paper, we propose a five-step approach to detect obfuscated malware by investigating the str...
In this paper, we propose a five-step approach to detect obfuscated malware by investigating the str...
Malware stands for malicious software. It is software that is designed with a harmful intent. A malw...
API functions often require the crafting of specific inputs and may return some output that is usua...
Malware is the primary attack vector against the modern enterprise. Therefore, it is crucial for bus...
This paper presents the detection techniques of anomalous programs based on the analysis of their sy...
The widespread development of the malware industry is considered the main threat to our e-society. T...
The proliferation of malware (viruses, Trojans, and other malicious code) in recent years has presen...
Recently, most researchers have employed behaviour based detection systems to classify Portable Exec...
An open research question in malware detection is how to accurately and reliably distinguish a malwa...
One of the recent trends adopted by malware authors is to use packers or software tools that instiga...
Advancements in malware development, including the use of file-less and memory-only payloads, have l...
The proper interpretation of the malware API call sequence plays a crucial role in identifying its m...
In the era of ubiquitous sensors and smart devices, detecting malware is becoming an endless battle ...
Malware is a major security threat confronting computer systems and networks and has increased in sc...
In this paper, we propose a five-step approach to detect obfuscated malware by investigating the str...
In this paper, we propose a five-step approach to detect obfuscated malware by investigating the str...
Malware stands for malicious software. It is software that is designed with a harmful intent. A malw...
API functions often require the crafting of specific inputs and may return some output that is usua...
Malware is the primary attack vector against the modern enterprise. Therefore, it is crucial for bus...
This paper presents the detection techniques of anomalous programs based on the analysis of their sy...
The widespread development of the malware industry is considered the main threat to our e-society. T...
The proliferation of malware (viruses, Trojans, and other malicious code) in recent years has presen...
Recently, most researchers have employed behaviour based detection systems to classify Portable Exec...