A heuristic approach for detection of obfuscated malware.
Scott TreadwellMian ZhouPublished in: ISI (2009)
Keyphrases
- reverse engineering
- automatic detection
- optimal solution
- detection algorithm
- false alarms
- malicious code
- malware detection
- detection scheme
- object detection
- anomaly detection
- beam search
- detection accuracy
- computer vision
- tabu search
- detection method
- object oriented
- neural network
- feasible solution
- detection rate
- false positives
- heuristic methods
- control flow
- dynamic analysis
- evolutionary algorithm