Use of cryptography in malware obfuscation.
Hassan Jameel AsgharBenjamin Zi Hao ZhaoMuhammad IkramGiang Linh Duc NguyenDali KaafarSean LamontDaniel CosciaPublished in: J. Comput. Virol. Hacking Tech. (2024)
Keyphrases
- malware detection
- reverse engineering
- control flow
- static analysis
- anti virus
- cellular automata
- malicious code
- anomaly detection
- data flow
- computer security
- dynamic analysis
- information security
- software engineering
- encryption algorithms
- decision trees
- search engine
- software testing
- object oriented
- multi agent
- multiscale
- e learning
- computer vision
- public key cryptography
- neural network