SoK: Use of Cryptography in Malware Obfuscation.
Hassan Jameel AsgharBenjamin Zi Hao ZhaoMuhammad IkramGiang NguyenDali KaafarSean LamontDaniel CosciaPublished in: IACR Cryptol. ePrint Arch. (2022)
Keyphrases
- malware detection
- reverse engineering
- control flow
- static analysis
- cellular automata
- malicious code
- anti virus
- information security
- dynamic analysis
- computer security
- object oriented
- anomaly detection
- data flow
- software engineering
- operating system
- source code
- information systems
- encryption algorithms
- database
- software testing
- intrusion detection
- similarity measure
- real world