Control flow change in assembly as a classifier in malware analysis

@article{Linke2016ControlFC,
  title={Control flow change in assembly as a classifier in malware analysis},
  author={Andree Linke and Nhien-An Le-Khac},
  journal={2016 4th International Symposium on Digital Forensic and Security (ISDFS)},
  year={2016},
  pages={38-43}
}
As currently classical malware detection methods based on signatures fail to detect new malware, they are not always efficient with new obfuscation techniques. Besides, new malware is easily created and old malware can be recoded to produce new one. Therefore, classical Antivirus becomes consistently less effective in dealing with those new threats. Also malware gets hand tailored to bypass network security and Antivirus. But as analysts do not have enough time to dissect suspected malware by… CONTINUE READING
Recent Discussions
This paper has been referenced on Twitter 2 times over the past 90 days. VIEW TWEETS
5 Citations
13 References
Similar Papers

References

Publications referenced by this paper.
Showing 1-10 of 13 references

Mathematik. (Spektrum Akademischer Verlag Heidelberg (Springer)

  • T Arens
  • 2009
Highly Influential
11 Excerpts

NoThink! NoThink! Malware archives

  • M. Cantoni
  • 2014
1 Excerpt

Symantec Develops New Attack on Cyberhacking

  • D. Yadron
  • Wall Street Journal
  • 2014
1 Excerpt

distorm - Powerful Disassembler Library For x86/AMD64

  • G. Dabah
  • 2014
1 Excerpt

Similar Papers

Loading similar papers…