A Survey on malware analysis and mitigation techniques

作者: S. Sibi Chakkaravarthy , D. Sangeetha , V. Vaidehi

DOI: 10.1016/J.COSREV.2019.01.002

关键词:

摘要: … malwares are highly persistent and capable of escaping from the security systems. This paper explores such an advanced malware … -developed malware) is packed into a pdf and sent …

参考文章(71)
He Sun, Kun Sun, Yuewu Wang, Jiwu Jing, Reliable and Trustworthy Memory Acquisition on Smartphones IEEE Transactions on Information Forensics and Security. ,vol. 10, pp. 2547- 2561 ,(2015) , 10.1109/TIFS.2015.2467356
Saranya Chandran, P Hrudya, Prabaharan Poornachandran, None, An efficient classification model for detecting advanced persistent threat advances in computing and communications. pp. 2001- 2009 ,(2015) , 10.1109/ICACCI.2015.7275911
Smita Naval, Vijay Laxmi, Muttukrishnan Rajarajan, Manoj Singh Gaur, Mauro Conti, Employing Program Semantics for Malware Detection IEEE Transactions on Information Forensics and Security. ,vol. 10, pp. 2591- 2604 ,(2015) , 10.1109/TIFS.2015.2469253
Jared DeMott, Bypassing EMET 4.1 ieee symposium on security and privacy. ,vol. 13, pp. 66- 72 ,(2015) , 10.1109/MSP.2015.75
Silvio Cesare, Yang Xiang, Wanlei Zhou, Control Flow-Based Malware VariantDetection IEEE Transactions on Dependable and Secure Computing. ,vol. 11, pp. 307- 317 ,(2014) , 10.1109/TDSC.2013.40
Hector Marco Gisbert, Ismael Ripoll, On the Effectiveness of NX, SSP, RenewSSP, and ASLR against Stack Buffer Overflows network computing and applications. pp. 145- 152 ,(2014) , 10.1109/NCA.2014.28
Hugo F Gonzalez-Robledo, Analyzing characteristics of malicious PDFs IEEE Latin America Transactions. ,vol. 10, pp. 1767- 1773 ,(2012) , 10.1109/TLA.2012.6222583
Byoungyoung Lee, Long Lu, Tielei Wang, Taesoo Kim, Wenke Lee, From Zygote to Morula: Fortifying Weakened ASLR on Android ieee symposium on security and privacy. pp. 424- 439 ,(2014) , 10.1109/SP.2014.34
Van Lam Le, Ian Welch, Xiaoying Gao, Peter Komisarczuk, Detecting heap-spray attacks in drive-by downloads: Giving attackers a hand local computer networks. pp. 300- 303 ,(2013) , 10.1109/LCN.2013.6761254
Aditya K Sood, Richard Enbody, Targeted Cyberattacks: A Superset of Advanced Persistent Threats ieee symposium on security and privacy. ,vol. 11, pp. 54- 61 ,(2013) , 10.1109/MSP.2012.90