- Home
- Publications
- Publication Search
- Publication Details
Title
A survey on run-time packers and mitigation techniques
Authors
Keywords
-
Journal
International Journal of Information Security
Volume -, Issue -, Pages -
Publisher
Springer Science and Business Media LLC
Online
2023-11-01
DOI
10.1007/s10207-023-00759-y
References
Ask authors/readers for more resources
Related references
Note: Only part of the references are listed.- Packer classification based on association rule mining
- (2022) Khanh Huu The Dam et al. APPLIED SOFT COMPUTING
- 2-SPIFF: a 2-stage packer identification method based on function call graph and file attributes
- (2021) Hao Liu et al. APPLIED INTELLIGENCE
- Getting Ahead of the Arms Race: Hothousing the Coevolution of VirusTotal with a Packer
- (2021) Héctor D. Menéndez et al. Entropy
- A dynamic Windows malware detection and prediction method based on contextual understanding of API call sequence
- (2020) Eslam Amer et al. COMPUTERS & SECURITY
- DeepDetectNet vs RLAttackNet: An adversarial method to improve deep learning-based static malware detection model
- (2020) Yong Fang et al. PLoS One
- Birds of a Feature: Intrafamily Clustering for Version Identification of Packed Malware
- (2020) Leo Hyun Park et al. IEEE Systems Journal
- Mal-Flux: Rendering hidden code of packed binary executable
- (2019) Charles Lim et al. Digital Investigation
- Effective, Efficient, and Robust Packing Detection and Classification
- (2019) Fabrizio Biondi et al. COMPUTERS & SECURITY
- Mimicking Anti-Viruses with Machine Learning and Entropy Profiles
- (2019) Héctor D. Menéndez et al. Entropy
- A Malware and Variant Detection Method Using Function Call Graph Isomorphism
- (2019) Jinrong Bai et al. Security and Communication Networks
- All-in-One Framework for Detection, Unpacking, and Verification for Malware Analysis
- (2019) Mi-Jung Choi et al. Security and Communication Networks
- A deep Recurrent Neural Network based approach for Internet of Things malware threat hunting
- (2018) Hamed HaddadPajouh et al. Future Generation Computer Systems-The International Journal of eScience
- Packer identification method based on byte sequences
- (2018) ByeongHo Jung et al. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE
- The arms race: Adversarial search defeats entropy used to detect malware
- (2018) Héctor D. Menéndez et al. EXPERT SYSTEMS WITH APPLICATIONS
- Packer Detection for Multi-Layer Executables Using Entropy Analysis
- (2017) Munkhbayar Bat-Erdene et al. Entropy
- An Efficient and Packing-Resilient Two-Phase Android Cloned Application Detection Approach
- (2017) Fang Lyu et al. Mobile Information Systems
- Entropy analysis to classify unknown packing algorithms for malware detection
- (2016) Munkhbayar Bat-Erdene et al. International Journal of Information Security
- An efficient block-discriminant identification of packed malware
- (2015) SMITA NAVAL et al. SADHANA-ACADEMY PROCEEDINGS IN ENGINEERING SCIENCES
- A static heuristic approach to detecting malware targets
- (2015) Mohaddeseh Zakeri et al. Security and Communication Networks
- On the adoption of anomaly detection for packed executable filtering
- (2014) Xabier Ugarte-Pedrero et al. COMPUTERS & SECURITY
- Differential entropy analysis of the IDEA block cipher
- (2013) Alex Biryukov et al. JOURNAL OF COMPUTATIONAL AND APPLIED MATHEMATICS
- Malwise—An Effective and Efficient Classification System for Packed and Polymorphic Malware
- (2012) Silvio Cesare et al. IEEE TRANSACTIONS ON COMPUTERS
- Classification of packed executables for accurate computer virus detection
- (2008) Roberto Perdisci et al. PATTERN RECOGNITION LETTERS
Discover Peeref hubs
Discuss science. Find collaborators. Network.
Join a conversationAsk a Question. Answer a Question.
Quickly pose questions to the entire community. Debate answers and get clarity on the most important issues facing researchers.
Get Started