SoK: Use of Cryptography in Malware Obfuscation.
Hassan Jameel AsgharBenjamin Zi Hao ZhaoMuhammad IkramGiang L. D. NguyenDali KaafarSean LamontDaniel CosciaPublished in: CoRR (2022)
Keyphrases
- malware detection
- reverse engineering
- control flow
- static analysis
- cellular automata
- anti virus
- anomaly detection
- malicious code
- information security
- dynamic analysis
- data flow
- software engineering
- object oriented
- software testing
- process model
- machine learning
- database
- encryption algorithms
- similarity measure
- information systems
- information retrieval
- databases