The 5th Conference on Information and Knowledge Technology 2013
DOI: 10.1109/ikt.2013.6620049
|View full text |Cite
|
Sign up to set email alerts
|

A survey on heuristic malware detection techniques

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
129
0

Year Published

2015
2015
2022
2022

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 213 publications
(129 citation statements)
references
References 24 publications
0
129
0
Order By: Relevance
“…For instance, "obfuscation" allows to hide harmful goal of the malware [22]. Another technique, "polymorphism" enables a malware look different each time it replicates itself [23]. Recently developed, "metamorphism" allows malicious code to change itself, so that the new one has no resemblance with the others but same "goal" malwares [23].…”
Section: Rootkitsmentioning
confidence: 99%
“…For instance, "obfuscation" allows to hide harmful goal of the malware [22]. Another technique, "polymorphism" enables a malware look different each time it replicates itself [23]. Recently developed, "metamorphism" allows malicious code to change itself, so that the new one has no resemblance with the others but same "goal" malwares [23].…”
Section: Rootkitsmentioning
confidence: 99%
“…Therefore, it is crucial to have an efficient protection against this kind of malicious programs. The existing anti-malware techniques can be broadly classified in three classes, which are signature-based, behavioral-based and heuristic-based techniques [1]. Signature-based techniques are widely used by most of commercial antivirus software (AV).…”
Section: Introductionmentioning
confidence: 99%
“…Signature-based techniques are widely used by most of commercial antivirus software (AV). These techniques are very accurate for detecting known malware that exist in the signatures" database [1]. However, they are not able to deal with unknown malware or newly launched ones, often developed after discovering a zero-day exploit [2].…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations