Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 218,268,535 papers from all fields of science
Search
Sign In
Create Free Account
Malware analysis
Malware Analysis is the study or process of determining the functionality and potential impact of a given malware sample such as a virus, trojan…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
12 relations
Computer security incident management
GNU Debugger
HxD
Indicator of compromise
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2015
Highly Cited
2015
Hidden Markov models for malware classification
Chinmayee Annachhatre
,
Thomas H. Austin
,
M. Stamp
Journal of Computer Virology and Hacking…
2015
Corpus ID: 9558357
Previous research has shown that hidden Markov model (HMM) analysis is useful for detecting certain challenging classes of…
Expand
Highly Cited
2014
Highly Cited
2014
BareCloud: Bare-metal Analysis-based Evasive Malware Detection
Dhilung Kirat
,
Giovanni Vigna
,
Christopher Krügel
USENIX Security Symposium
2014
Corpus ID: 3194422
The volume and the sophistication of malware are continuously increasing and evolving. Automated dynamic malware analysis is a…
Expand
Highly Cited
2014
Highly Cited
2014
DroidDolphin: a dynamic Android malware detection framework using big data and machine learning
Wen-Chieh Wu
,
Shih-Hao Hung
Research in Adaptive and Convergent Systems
2014
Corpus ID: 6608112
Smartphones are getting more and more popular nowadays with various kinds of applications to make our lives more convenient…
Expand
Highly Cited
2013
Highly Cited
2013
Droid Analytics: A Signature Based Analytic System to Collect, Extract, Analyze and Associate Android Malware
Min Zheng
,
Mingshen Sun
,
John C.S. Lui
12th IEEE International Conference on Trust…
2013
Corpus ID: 10289168
Smartphones and mobile devices are rapidly becoming indispensable devices for many users. Unfortunately, they also become fertile…
Expand
Highly Cited
2013
Highly Cited
2013
Automated malware classification based on network behavior
S. Nari
,
A. Ghorbani
International Conference on Computing, Networking…
2013
Corpus ID: 2808652
Over the past decade malware, i.e., malicious software, has become a major security threat on the Internet. Today anti-virus…
Expand
Highly Cited
2012
Highly Cited
2012
DroidMat: Android Malware Detection through Manifest and API Calls Tracing
Dong-Jie Wu
,
Ching-Hao Mao
,
Te-En Wei
,
Hahn-Ming Lee
,
Kuo-Ping Wu
Seventh Asia Joint Conference on Information…
2012
Corpus ID: 206511836
Recently, the threat of Android malware is spreading rapidly, especially those repackaged Android malware. Although understanding…
Expand
Highly Cited
2011
Highly Cited
2011
BareBox: efficient malware analysis on bare-metal
Dhilung Kirat
,
Giovanni Vigna
,
Christopher Krügel
Asia-Pacific Computer Systems Architecture…
2011
Corpus ID: 9198311
Present-day malware analysis techniques use both virtualized and emulated environments to analyze malware. The reason is that…
Expand
Highly Cited
2009
Highly Cited
2009
A View on Current Malware Behaviors
Ulrich Bayer
,
Imam Habibi
,
D. Balzarotti
,
E. Kirda
USENIX Workshop on Large-Scale Exploits and…
2009
Corpus ID: 9147342
Anubis is a dynamic malware analysis platform that executes submitted binaries in a controlled environment. To perform the…
Expand
Highly Cited
2009
Highly Cited
2009
IMAD: in-execution malware analysis and detection
S. B. Mehdi
,
A. Tanwani
,
M. Farooq
Annual Conference on Genetic and Evolutionary…
2009
Corpus ID: 14543869
The sophistication of computer malware is becoming a serious threat to the information technology infrastructure, which is the…
Expand
Highly Cited
2008
Highly Cited
2008
Impeding Malware Analysis Using Conditional Code Obfuscation
Monirul I. Sharif
,
A. Lanzi
,
Jonathon T. Giffin
,
Wenke Lee
Network and Distributed System Security Symposium
2008
Corpus ID: 6704320
Malware programs that incorporate trigger-based behavior initiate malicious activities based on conditions satisfied only by…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE