Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 225,400,097 papers from all fields of science
Search
Sign In
Create Free Account
Malware analysis
Malware Analysis is the study or process of determining the functionality and potential impact of a given malware sample such as a virus, trojan…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
12 relations
Computer security incident management
GNU Debugger
HxD
Indicator of compromise
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2020
2020
A Quantum Algorithm To Locate Unknown Hashes For Known N-Grams Within A Large Malware Corpus
Nicholas R. Allgood
,
Charles K. Nicholas
arXiv.org
2020
Corpus ID: 218516758
We extend our thanks to our colleagues Sam Lomonaco and Edward Raff for their comments on an earlier version of this paper
2017
2017
Evolving Deep Neural Networks architectures for Android malware classification
Alejandro Martín
,
Félix Fuentes-Hurtado
,
V. Naranjo
,
David Camacho
IEEE Congress on Evolutionary Computation
2017
Corpus ID: 7473800
Deep Neural Networks (DNN) have become a powerful, widely used, and successful mechanism to solve problems of different nature…
Expand
2014
2014
Thwarting Obfuscated Malware via Differential Fault Analysis
Guillermo Suarez-Tangil
,
J. Tapiador
,
F. Lombardi
,
R. D. Pietro
Computer
2014
Corpus ID: 16417923
Detecting malware in mobile applications has become increasingly complex as malware developers turn to advanced techniques to…
Expand
2013
2013
Non-intrusive process-based monitoring system to mitigate and prevent VM vulnerability explorations
Chun-Jen Chung
,
Jingsong Cui
,
Pankaj Khatkar
,
Dijiang Huang
9th IEEE International Conference on…
2013
Corpus ID: 1199339
Cloud is gaining momentum but its true potential is hampered by the security concerns it has raised. Having vulnerable virtual…
Expand
2013
2013
Differential malware forensics
Athina Provataki
,
Vasilios Katos
Digital Investigation. The International Journal…
2013
Corpus ID: 38989392
2012
2012
Malware Analysis & its Application to Digital Forensic
Gursimran Kaur
,
Bharti Nagpal
2012
Corpus ID: 11727791
:- In this paper we present study about how to analyze the malware on the system for digital investigation and also give the…
Expand
2012
2012
Malware target recognition via static heuristics
Thomas E. Dube
,
R. Raines
,
Gilbert L. Peterson
,
K. Bauer
,
M. Grimaila
,
S. Rogers
Computers & security
2012
Corpus ID: 10267243
2009
2009
Control flow obfuscation with information flow tracking
Haibo Chen
,
Liwei Yuan
,
Xi Wu
,
B. Zang
,
Bo Huang
,
P. Yew
Micro
2009
Corpus ID: 9643507
Recent micro-architectural research has proposed various schemes to enhance processors with additional tags to track various…
Expand
Review
2008
Review
2008
nicter: An Incident Analysis System Toward Binding Network Monitoring with Malware Analysis
D. Inoue
,
M. Eto
,
+5 authors
K. Nakao
WOMBAT Workshop on Information Security Threats…
2008
Corpus ID: 617803
We have been developing the Network Incident analysis Center for Tactical Emergency Response (nicter), whose present focus is on…
Expand
2008
2008
Towards Dynamic Malware Analysis to Increase Mobile Device Security423
M. Becher
,
F. Freiling
Sicherheit
2008
Corpus ID: 12395541
: Mobile de v ice s like s ma rt phone s ha v e diffe r en t p r ope rt ie s compa r ed t o common pe rs onal comp ut e rs . The…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE