2022
DOI: 10.1016/j.cose.2022.102613
|View full text |Cite
|
Sign up to set email alerts
|

Enhancing malware analysis sandboxes with emulated user behavior

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0
1

Year Published

2022
2022
2024
2024

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 20 publications
(8 citation statements)
references
References 9 publications
0
6
0
1
Order By: Relevance
“…In addition, fine-tuning neurons in the running layers could significantly affect deep learning prediction accuracy and minimize the elapsed time (time consumption by training and testing pipelines). Hence, the dual deep learning predictive model like that of CNN-BiLSTM architecture could emulate the training imbalanced cyber-data stream into an informative feature space without compromising its effectiveness and efficiency in a sandboxing context [42], [43]. According to the results shown in Table 5, our technique offers comparable accuracy, recall, and precision to the current state-of-the-art models.…”
Section: Resultsmentioning
confidence: 89%
“…In addition, fine-tuning neurons in the running layers could significantly affect deep learning prediction accuracy and minimize the elapsed time (time consumption by training and testing pipelines). Hence, the dual deep learning predictive model like that of CNN-BiLSTM architecture could emulate the training imbalanced cyber-data stream into an informative feature space without compromising its effectiveness and efficiency in a sandboxing context [42], [43]. According to the results shown in Table 5, our technique offers comparable accuracy, recall, and precision to the current state-of-the-art models.…”
Section: Resultsmentioning
confidence: 89%
“…• Licensing Model: If the malware sandbox has an opensource or commercial license. [18], [52], [8], [25], [34].…”
Section: Discussionmentioning
confidence: 99%
“…Liu et al [18] proposed a system called User Behavior Emulator (UBER) designed to enhance malware analysis sandboxes by generating realistic system artefacts based on automatically derived user profile models. UBER aimed to prevent sandbox detection by malware leveraging system fingerprinting.…”
Section: Chen Et Almentioning
confidence: 99%
“…Há esforços da comunidade acadêmica para minimizar as chances de detecção do ambiente controlado. Em [Liu et al 2022], os autores propõem a emulação de comportamentos de usuários reais no sistema. Já a pesquisa [Mills and Legg 2020] investiga as técnicas anti-evasion por meio de reconfiguração da sandbox.…”
Section: Funcionamento Da Análise Automatizadaunclassified