Evolution and Detection of Polymorphic and Metamorphic Malwares: A Survey

[1]  Kangbin Yim,et al.  Malware Obfuscation Techniques: A Brief Survey , 2010, 2010 International Conference on Broadband, Wireless Computing, Communication and Applications.

[2]  Suhaimi Ibrahim,et al.  Camouflage in Malware: from Encryption to Metamorphism , 2012 .

[3]  Nhat-Phuong Tran,et al.  High performance string matching for security applications , 2013, International Conference on ICT for Smart Society.

[4]  Peter Szor,et al.  HUNTING FOR METAMORPHIC , 2001 .

[5]  Paul A. Watters,et al.  Zero-day Malware Detection based on Supervised Learning Algorithms of API call Signatures , 2011, AusDM.

[6]  Subariah Ibrahim,et al.  Morphed Virus Family Classification Based on Opcodes Statistical Feature Using Decision Tree , 2011 .

[7]  A.H. Sung,et al.  Polymorphic malicious executable scanner by API sequence analysis , 2004, Fourth International Conference on Hybrid Intelligent Systems (HIS'04).

[8]  Joohan Lee,et al.  A survey of data mining techniques for malware detection using file features , 2008, ACM-SE 46.

[9]  Philippe Beaucamps Advanced Polymorphic Techniques , 2007 .

[10]  Mark Stamp,et al.  Exploring Hidden Markov Models for Virus Analysis: A Semantic Approach , 2013, 2013 46th Hawaii International Conference on System Sciences.

[11]  Eoghan Casey,et al.  Linux Malware Incident Response: A Practitioner's Guide to Forensic Collection and Examination of Volatile Data: An Excerpt from Malware Forensic Field Guide for Linux Systems , 2013 .

[12]  Lior Rokach,et al.  Detection of unknown computer worms based on behavioral classification of the host , 2008, Comput. Stat. Data Anal..

[13]  Tzi-cker Chiueh,et al.  Automatic Generation of String Signatures for Malware Detection , 2009, RAID.

[14]  Suhaimi Ibrahim,et al.  Evolution of Computer Virus Concealment and Anti-Virus Techniques: A Short Survey , 2011, ArXiv.

[15]  Richard Stone A call to cyber arms. , 2013, Science.

[16]  Jian Xu,et al.  A similarity metric method of obfuscated malware using function-call graph , 2012, Journal of Computer Virology and Hacking Techniques.

[17]  Guido Bertoni,et al.  Keccak sponge function family main document , 2009 .

[18]  John C. S. Lui,et al.  Droid Analytics: A Signature Based Analytic System to Collect, Extract, Analyze and Associate Android Malware , 2013, 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications.

[19]  Abhishek Shah,et al.  Approximate Disassembly using Dynamic Programming , 2010 .

[20]  Mark Stamp,et al.  Hunting for metamorphic engines , 2006, Journal in Computer Virology.

[21]  Mark Stamp,et al.  Chi-squared distance and metamorphic virus detection , 2013, Journal of Computer Virology and Hacking Techniques.