MALWARE ANALYSIS AND STATIC CALL GRAPH GENERATION WITH RADARE2
A powerful feature used in automated malware analysis is the static call graph of the executable file. Elimination of sandbox environment, fast scan, function call patterns beyond instruction level information – all of these motivate the prevalence of the feature. Processing and storing the static...
Main Author: | Attila MESTER |
---|---|
Format: | Article |
Language: | English |
Published: |
Babes-Bolyai University, Cluj-Napoca
2023-07-01
|
Series: | Studia Universitatis Babes-Bolyai: Series Informatica |
Subjects: | |
Online Access: | http://193.231.18.162/index.php/subbinformatica/article/view/6349 |
Similar Items
-
Android Malware Detection Based on Structural Features of the Function Call Graph
by: Yang Yang, et al.
Published: (2021-01-01) -
Malware detection framework based on graph variational autoencoder extracted embeddings from API-call graphs
by: Hakan Gunduz
Published: (2022-05-01) -
Static Call Graph Combination to Simulate Dynamic Call Graph Behavior
by: Zoltan Sagodi, et al.
Published: (2022-01-01) -
Android Malware Detection Based on Behavioral-Level Features with Graph Convolutional Networks
by: Qingling Xu, et al.
Published: (2023-11-01) -
Similarity-Based Hybrid Malware Detection Model Using API Calls
by: Asma A. Alhashmi, et al.
Published: (2023-06-01)