Essays about: "evasive malware"

Found 4 essays containing the words evasive malware.

  1. 1. Impersonating a sandbox against evasive malware

    University essay from Högskolan i Skövde/Institutionen för informationsteknologi

    Author : Axel Lindorin; [2022]
    Keywords : evasive; malware; malware analysis; comparison; sandbox;

    Abstract : The steadily increasing amount of malware puts an even larger amount of work required to analyze all the gathered samples. The current methods of analyzing malware come with their downsides such as inefficiency as a manual analysis requires a human or dynamic analysis that could be considered unreliable. READ MORE

  2. 2. Increased evasion resilience in modern PDF malware detectors : Using a more evasive training dataset

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Oscar Ekholm; [2022]
    Keywords : Malware Analysis; Malicious PDF; Malware Detection; Machine Learning; Evasion; Analys av skadlig programvara; Skadlig PDF; Detektion av skadlig programvara; Maskininlärning; Undanflykt;

    Abstract : The large scale usage of the PDF coupled with its versatility has made the format an attractive target for carrying and deploying malware. Traditional antivirus software struggles against new malware and PDF's vast obfuscation options. In the search of better detection systems, machine learning based detectors have been developed. READ MORE

  3. 3. Classifying evasive malware

    University essay from Lunds universitet/Institutionen för elektro- och informationsteknik

    Author : David Norrestam; Gustaf Ekenstein; [2017]
    Keywords : machine learning; malware; evasive malware; Technology and Engineering;

    Abstract : Malware are become increasingly aware of their execution environment. In order to avoid detection by automated analysis solutions and to obstruct manual analysis, malware authors are coming up with new ways for their malware to decide whether it should express its malicious behavior or not. READ MORE

  4. 4. Malicious Entity Categorization using Graph modelling

    University essay from KTH/Skolan för informations- och kommunikationsteknik (ICT)

    Author : Gayathri Srinivaasan; [2016]
    Keywords : malware; classification; graph modelling; graph mining; downloader; payload; URL; file sample; graph traversal; malware; klassificering; graf modellering; graf gruvdrift; dataöverföring; nyttolast; URL; fil prov; graf traverse;

    Abstract : Today, malware authors not only write malicious software but also employ obfuscation, polymorphism, packing and endless such evasive techniques to escape detection by Anti-Virus Products (AVP). Besides the individual behavior of malware, the relations that exist among them play an important role for improving malware detection. READ MORE