Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 233,384,107 papers from all fields of science
Search
Sign In
Create Free Account
Malware analysis
Malware Analysis is the study or process of determining the functionality and potential impact of a given malware sample such as a virus, trojan…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
12 relations
Computer security incident management
GNU Debugger
HxD
Indicator of compromise
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
Knowledge Generation in Visual Analytics: Integrating Human and Machine Intelligence for Exploration of Big Data
D. Sacha
Ausgezeichnete Informatikdissertationen
2018
Corpus ID: 13684593
Big data poses many facets and challenges when analyzing data, often described with the five big V’s of Volume, Variety, Velocity…
Expand
2016
2016
A Complete Dynamic Malware Analysis
Navroop Kaur
,
Amit Kumar Bindal
2016
Corpus ID: 267794027
Now a days thousands of malware samples are received by anti-malware companies on daily basis. And these large numbers are send…
Expand
2014
2014
Honeypots deployment for the analysis and visualization of malware activity and malicious connections
Ioannis Koniaris
,
G. Papadimitriou
,
Petros Nicopolitidis
,
M. Obaidat
IEEE International Conference on Communications…
2014
Corpus ID: 14759636
Honeypots are systems aimed at deceiving threat agents. In most of the cases the latter are cyber attackers with financial…
Expand
2014
2014
CAS : A FRAMEWORK OF ONLINE DETECTING ADVANCE MALWARE FAMILIES FOR CLOUD-BASED SECURITY
Abhilash Sreeramaneni
2014
Corpus ID: 61731432
2013
2013
Detecting Distributed SQL Injection Attacks in a Eucalyptus Cloud Environment
Alan Kebert
,
Bikramjit Barnejee
,
J. Solano
,
Wanda M. Solano
2013
Corpus ID: 13662036
The cloud computing environment offers malicious users the ability to spawn multiple instances of cloud nodes that are similar to…
Expand
Review
2013
Review
2013
Malware Analysis for Android Operating
K. Sharma
,
Trushank Dand
,
T. Oh
,
W. Stackpole
2013
Corpus ID: 15618573
The number of mobile devices has dramatically increased in the last decade. As the mobile devices become more pervasive, users…
Expand
2012
2012
Malware Analysis & its Application to Digital Forensic
Gursimran Kaur
,
Bharti Nagpal
2012
Corpus ID: 11727791
:- In this paper we present study about how to analyze the malware on the system for digital investigation and also give the…
Expand
Review
2010
Review
2010
Self-defence of information systems in cyber-space : a critical overview
Mario Couture
,
R. Charpentier
,
M. Dagenais
,
A. Hamou-lhadj
,
Abdelouahed Gherbi
2010
Corpus ID: 53639184
Abstract : Nowadays information systems (ISs) that are utilized to support military operations are much more complex than a…
Expand
2009
2009
Mac OS X Malware Analysis
J. Yonts
,
Donatus Weber
2009
Corpus ID: 61488809
As Apple's market share raises so will the Malware! Will incident responders be ready to address this rising threat? Leveraging…
Expand
2009
2009
Rotalumè: A Tool for Automatic Reverse Engineering of Malware Emulators
Monirul I. Sharif
,
A. Lanzi
,
Jonathon T. Giffin
,
Wenke Lee
2009
Corpus ID: 15481672
Malware authors have recently begun using emulation technology to obfuscate their code. They convert native malware binaries into…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE