Hybrid Analysis and Control of Malware

  title={Hybrid Analysis and Control of Malware},
  author={Kevin A. Roundy and Barton P. Miller},
Malware attacks necessitate extensive forensic analysis efforts that are manual-labor intensive because of the analysis-resistance techniques that malware authors employ. The most prevalent of these techniques are code unpacking, code overwriting, and control transfer obfuscations. We simplify the analyst’s task by analyzing the code prior to its execution and by providing the ability to selectively monitor its execution. We achieve pre-execution analysis by combining static and dynamic… CONTINUE READING
Highly Cited
This paper has 32 citations. REVIEW CITATIONS
Related Discussions
This paper has been referenced on Twitter 1 time. VIEW TWEETS


Publications citing this paper.
Showing 1-10 of 24 extracted citations

Data Analytics and Decision Support for Cybersecurity

Iván Palomares Carrascosa, Harsha K. Kalutarage, Yan Huang
Data Analytics • 2017
View 5 Excerpts
Highly Influenced

Cross-Platform Malware Contamination

Nicholas Aquilina
View 5 Excerpts
Highly Influenced

Proposed new features to improve Android malware detection

2016 8th International Symposium on Telecommunications (IST) • 2016
View 3 Excerpts
Highly Influenced

Automatic malware classification and new malware detection using machine learning

Frontiers of Information Technology & Electronic Engineering • 2017
View 1 Excerpt

Reachability Analysis of Self Modifying Code

2017 22nd International Conference on Engineering of Complex Computer Systems (ICECCS) • 2017
View 2 Excerpts

Evolution of evasive malwares: A survey

2016 International Conference on Computational Techniques in Information and Communication Technologies (ICCTICT) • 2016
View 1 Excerpt


Publications referenced by this paper.
Showing 1-10 of 50 references

Anti-unpacker tricks

P. Ferrie
International CARO Workshop. Amsterdam, The Netherlands • 2008
View 6 Excerpts
Highly Influenced

Ether: malware analysis via hardware virtualization extensions

ACM Conference on Computer and Communications Security • 2008
View 11 Excerpts
Highly Influenced

A Case Study of the Rustock Rootkit and Spam Bot

HotBots • 2007
View 4 Excerpts
Highly Influenced

BIRD: binary interpretation using runtime disassembly

International Symposium on Code Generation and Optimization (CGO'06) • 2006
View 9 Excerpts
Highly Influenced

MAVMM: Lightweight and Purpose Built VMM for Malware Analysis

2009 Annual Computer Security Applications Conference • 2009
View 5 Excerpts
Highly Influenced

Malware prevalence

P. Bustamante
Panda Research web article • 2008
View 4 Excerpts
Highly Influenced

Temporal reverse engineering

D. Quist, C. Ames
Blackhat USA. Las Vegas, NV • 2008
View 7 Excerpts
Highly Influenced

BitDefender anti-virus technology

White Paper • 2007
View 4 Excerpts
Highly Influenced

Static Disassembly of Obfuscated Binaries

View 4 Excerpts
Highly Influenced

Similar Papers

Loading similar papers…