2018
DOI: 10.18517/ijaseit.8.4-2.6827
|View full text |Cite
|
Sign up to set email alerts
|

A Survey on Malware Analysis Techniques: Static, Dynamic, Hybrid and Memory Analysis

Abstract: The threats malware pose to the people around the world are increasing rapidly. A software that sneaks to your computer system without your knowledge with a harmful intent to disrupt your computer operations. Due to the vast number of malware, it is impossible to handle malware by human engineers. Therefore, security researchers are taking great efforts to develop accurate and effective techniques to detect malware. This paper offers an overall view and detailed survey for malware detection methods like signat… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
68
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
5
2
1

Relationship

1
7

Authors

Journals

citations
Cited by 137 publications
(83 citation statements)
references
References 54 publications
0
68
0
Order By: Relevance
“…Heuristic Detection is a malware analysis technique that works by searching for commands or instructions that can enable the discovery of new types of malware [10]. Here are the advantages and disadvantages of heuristic detection [11]: a. The advantages of heuristic detection are:…”
Section: Malware Analysismentioning
confidence: 99%
“…Heuristic Detection is a malware analysis technique that works by searching for commands or instructions that can enable the discovery of new types of malware [10]. Here are the advantages and disadvantages of heuristic detection [11]: a. The advantages of heuristic detection are:…”
Section: Malware Analysismentioning
confidence: 99%
“…Furthermore, it is preliminary for a malware file to be unpacked and decrypted to be executed. Moreover, malware artifacts remain in the memory for a while, even after the process is terminated [3]. Therefore, the proposed approach, which combines features from both the dynamic and memory analyses better, presents malware behaviors and intentions that are reflected in higher accuracy detection and lower false positive rates.…”
Section: Machine Learning Modelingmentioning
confidence: 99%
“…It is known that dynamic analysis is limited to a single view of path execution and, therefore, unexecuted API calls do not appear in the behavior report. However, unexecuted APIs could reveal another side of malware behavior [3]. Table 5 shows the 20 most prominent features that appear in the memory analysis but not in the dynamic analysis with their frequencies and percentages.…”
Section: Features In Memory and Dynamic Analysismentioning
confidence: 99%
See 1 more Smart Citation
“…There are several ways used in various cyber security researches [16] to detect malware either in anti-virus software or end point protection such as signature based and behavioral based. Unlike signature-based, behavioral based able to detect malware that uses obfuscation technique even though it is time consuming with considerable false positive.…”
Section: Related Workmentioning
confidence: 99%