Current Trends and the Future of Metamorphic Malware Detection

@inproceedings{Alam2014CurrentTA,
  title={Current Trends and the Future of Metamorphic Malware Detection},
  author={Shahid Alam and Issa Traor{\'e} and Ibrahim Sogukpinar},
  booktitle={SIN},
  year={2014}
}
Dynamic binary obfuscation or metamorphism is a technique where a malware never keeps the same sequence of opcodes in the memory. This stealthy mutation technique helps a malware evade detection by today's signature-based anti-malware programs. This paper analyzes the current trends, provides future directions and reasons about some of the basic characteristics of a system for providing real-time detection of metamorphic malware. Our emphasis is on the most recent advancements and the… CONTINUE READING

From This Paper

Figures, tables, and topics from this paper.

Explore Further: Topics Discussed in This Paper

Citations

Publications citing this paper.
Showing 1-2 of 2 extracted citations

Using Chi-Square test and heuristic search for detecting metamorphic malware

2015 First International Conference on New Technologies of Information and Communication (NTIC) • 2015
View 3 Excerpts
Highly Influenced

VMHunt: A Verifiable Approach to Partially-Virtualized Binary Code Simplification

ACM Conference on Computer and Communications Security • 2018
View 3 Excerpts

References

Publications referenced by this paper.
Showing 1-10 of 10 references

Automatic Malware Analysis

SpringerBriefs in Computer Science • 2013
View 5 Excerpts
Highly Influenced

Internet of Things

A. Skarmeta, M. Moreno
2014
View 3 Excerpts
Highly Influenced

Dynamic malware detection using registers values set analysis

2012 9th International ISC Conference on Information Security and Cryptology • 2012
View 6 Excerpts
Highly Influenced

Obfuscation: The Hidden Malware

IEEE Security & Privacy • 2011
View 4 Excerpts
Highly Influenced

The IDA Pro Book: The Unofficial Guide to the World’s Most Popular Disassembler

C. Eagle
2008
View 3 Excerpts
Highly Influenced

Compilers: Principles, Techniques, and Tools

Addison-Wesley series in computer science / World student series edition • 1986
View 6 Excerpts
Highly Influenced

Similar Papers

Loading similar papers…