Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
×
Jan 31, 2017 · In this paper, based on the modularized attack features, we apply the dynamic code generation and loading techniques to produce malware, so that ...
In this paper, based on the modularized attack features, we apply the dynamic code generation and loading techniques to produce malware so that we can audit the ...
Auditing anti-malware tools by evolving Android malware and dynamic loading technique. (2017). IEEE. Transactions on Information Forensics and Security. 12 ...
People also ask
May 30, 2016 · Based on this model, we develop a framework, MYSTIQUE, to automatically generate malware covering four attack features and two evasion features, ...
Jun 3, 2016 · Therefore, they can be easily defeated by involving dynamic loading techniques, such as reflection, constant encryption. Moreover, for.
The evolution of escape-resistant systems is an open research problem. This paper presents a detailed taxonomy and evaluation of Android-based malware evasion ...
Auditing Anti-Malware Tools by Evolving Android Malware and Dynamic Loading Technique. Published in IEEE Transactions on Information Forensics and Security ...
These tools use both static and dynamic analysis techniques to detect malicious applications. Despite these, the attack surface against Android phones has risen ...
Mystique: Evolving Android Malware for Auditing Anti-Malware Tools ... Therefore, they can be easily defeated by involving dynamic loading techniques, such as ...
Xue et al. Auditing anti-malware tools by evolving android malware and dynamic loading technique. IEEE Trans. Inf. Forensics Secur. (2017). M. Ahmad et al ...