Metamorphic malware propagation has persuaded the security society to consider about new approaches to confront this generation of malware with novel solutions. Control Flow Graph, CFG, has been successful in detection of simple malwares. By now, it needs to improve the CFG based detection methods to detect metamorphic malwares efficiently. Our Approach has improved the simple CFG with beneficial information by assuming called APIs on the CFG. Converting the resulted sparse graph to a vector to decrease the complexity of graph mining algorithms, a specific feature selection is utilized and different classification approaches has been qualified. The experimental results show the contribution of this approach in both accuracy and false detect...
Static detection of polymorphic malware variants plays an important role to improve system security....
The succeeding code for metamorphic Malware is routinely rewritten to remain stealthy and undetecte...
This study proposes a malware detection strategy based on control flow. It consists in searching in ...
Metamorphism is a technique that mutates the binary code using different obfuscations and never keep...
Next generation malware will by be characterized by the intense use of polymorphic and metamorphic t...
Well-designed metamorphic malware can evade many commonly used malware detection techniques includin...
Malware stands for malicious software. It is software that is designed with a harmful intent. A malw...
The succeeding code for metamorphic malware is routinely rewritten to remain stealthy and undetected...
Malware is a specific type of software intended to breed damages ranging from computer systems fallo...
Identifying malicious software provides great benefit for distributed and networked systems. Traditi...
This survey paper describes a proper literature review of algorithms used for analysis and detection...
Well-designed metamorphic malware can evade many commonly used malware detection techniques includin...
This study proposes a malware detection strategy based on control flow graphs. It carries out experi...
Detection tools such as virus scanners have performed poorly, particularly when facing previously un...
Metamorphic malware changes its internal structure with each infection, while maintaining its core f...
Static detection of polymorphic malware variants plays an important role to improve system security....
The succeeding code for metamorphic Malware is routinely rewritten to remain stealthy and undetecte...
This study proposes a malware detection strategy based on control flow. It consists in searching in ...
Metamorphism is a technique that mutates the binary code using different obfuscations and never keep...
Next generation malware will by be characterized by the intense use of polymorphic and metamorphic t...
Well-designed metamorphic malware can evade many commonly used malware detection techniques includin...
Malware stands for malicious software. It is software that is designed with a harmful intent. A malw...
The succeeding code for metamorphic malware is routinely rewritten to remain stealthy and undetected...
Malware is a specific type of software intended to breed damages ranging from computer systems fallo...
Identifying malicious software provides great benefit for distributed and networked systems. Traditi...
This survey paper describes a proper literature review of algorithms used for analysis and detection...
Well-designed metamorphic malware can evade many commonly used malware detection techniques includin...
This study proposes a malware detection strategy based on control flow graphs. It carries out experi...
Detection tools such as virus scanners have performed poorly, particularly when facing previously un...
Metamorphic malware changes its internal structure with each infection, while maintaining its core f...
Static detection of polymorphic malware variants plays an important role to improve system security....
The succeeding code for metamorphic Malware is routinely rewritten to remain stealthy and undetecte...
This study proposes a malware detection strategy based on control flow. It consists in searching in ...