Multi-path exploration guided by taint and probability against evasive malware
Static analysis is often impeded by malware obfuscation techniques, such as encryption and packing, whereas dynamic analysis tends to be more resistant to obfuscation by leveraging concrete execution information. Unfortunately, malware can employ evasive techniques to detect the analysis environment...
Main Authors: | Xu Fangzhou, Zhang Wang, Qiang Weizhong, Jin Hai |
---|---|
Format: | Article |
Language: | English |
Published: |
EDP Sciences
2023-01-01
|
Series: | Security and Safety |
Subjects: | |
Online Access: | https://sands.edpsciences.org/articles/sands/full_html/2023/01/sands20230021/sands20230021.html |
Similar Items
-
Attack signature generation by traceable dynamic taint analysis
by: Yu LIU, et al.
Published: (2012-05-01) -
Attack signature generation by traceable dynamic taint analysis
by: Yu LIU, et al.
Published: (2012-05-01) -
Dynamic Extraction of Initial Behavior for Evasive Malware Detection
by: Faitouri A. Aboaoja, et al.
Published: (2023-01-01) -
Malicious Behavior Detection Method Using API Sequence in Binary Execution Path
by: Jihun Kim, et al.
Published: (2021-01-01) -
Malware Visualization and Similarity via Tracking Binary Execution Path
by: Jihun Kim, et al.
Published: (2022-01-01)