History of malware
نویسنده
چکیده
In past three decades almost everything has changed in the field of malware and malware analysis. From malware created as proof of some security concept and malware created for financial gain to malware created to sabotage infrastructure. In this work we will focus on history and evolution of malware and describe most important malwares.
منابع مشابه
DyVSoR: dynamic malware detection based on extracting patterns from value sets of registers
To control the exponential growth of malware files, security analysts pursue dynamic approaches that automatically identify and analyze malicious software samples. Obfuscation and polymorphism employed by malwares make it difficult for signature-based systems to detect sophisticated malware files. The dynamic analysis or run-time behavior provides a better technique to identify the threat. In t...
متن کاملMachine Learning-Based Malware Detection for Android Applications: History Matters!
Machine Learning-based malware detection is a promising scalable method for identifying suspicious applications. In particular, in today’s mobile computing realm where thousands of applications are daily poured into markets, such a technique could be valuable to guarantee a strong filtering of malicious apps. The success of machine-learning approaches however is highly dependent on (1) the qual...
متن کاملEvaluation of Malware Phylogeny Modelling Systems Using Automat
A malware phylogeny model is an estimation of the derivation relationships between a set of species of malware. Systems that construct phylogeny models are expected to be useful for malware analysts. While several different phylogeny construction systems have been proposed, little is known about effective ways of evaluating and comparing them. Little is also known about the consistency of their...
متن کاملMalware Detection using Classification of Variable-Length Sequences
In this paper, a novel method based on the graph is proposed to classify the sequence of variable length as feature extraction. The proposed method overcomes the problems of the traditional graph with variable length of data, without fixing length of sequences, by determining the most frequent instructions and insertion the rest of instructions on the set of “other”, save speed and memory. Acco...
متن کاملSecuring mobile devices: malware mitigation methods
Malware on mobile handsets has always been a point of concern for its users. With the widespread adoption of smartphones and tablets and the emergence of centralized application markets it started to represent a significant threat. This situation has led to the development of defence methods for securing mobile devices coming from operating system developers, antivirus vendors and security rese...
متن کامل