IMAD: in-execution malware analysis and detection

@inproceedings{Mehdi2009IMADIM,
  title={IMAD: in-execution malware analysis and detection},
  author={Syed Bilal Mehdi and Ajay Kumar Tanwani and Muddassar Farooq},
  booktitle={GECCO},
  year={2009}
}
The sophistication of computer malware is becoming a serious threat to the information technology infrastructure, which is the backbone of modern e-commerce systems. We, therefore, advocate the need for developing sophisticated, efficient, and accurate malware classification techniques that can detect a malware on the first day of its launch -- commonly known as "zero-day malware detection". To this end, we present a new technique, IMAD, that can not only identify zero-day malware without any… CONTINUE READING
Highly Cited
This paper has 42 citations. REVIEW CITATIONS

Citations

Publications citing this paper.
Showing 1-10 of 26 extracted citations

Feature Extraction Using Genetic Programming with Applications in Malware Detection

2015 17th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing (SYNASC) • 2015
View 1 Excerpt

References

Publications referenced by this paper.

Similar Papers

Loading similar papers…