Scientific Papers about Malware Analysis

Top Conf

  • CCS

    • 2022
      • An Inside Look into the Practice of Malware Analysis
    • 2021
      • Structural Attack against Graph Based Android Malware Detection
    • 2020
      • VAHunt: Warding Off New Repackaged Android Malware in App-Virtualization’s Clothing
      • Enhancing State-of-the-art Classifiers with API Semantics to Detect Evolved Android Malware
    • 2019
      • MalMax: Multi-Aspect Execution for Automated Dynamic Web Server Malware Analysis
  • USENIX

    • 2021 (summer) (fall)
      • Obfuscation-Resilient Executable Payload Extraction From Packed Malware
      • Explanation-Guided Backdoor Poisoning Attacks Against Malware Classifiers
      • The Circle Of Life: A Large-Scale Study of The IoT Malware Lifecycle
      • Forecasting Malware Capabilities From Cyber Attack Memory Images
      • YARIX: Scalable YARA-based Malware Intelligence
    • 2020 (summer) (fall)
      • On Training Robust PDF Malware Classifiers
    • 2019
      • TESSERACT: Eliminating Experimental Bias in Malware Classification across Space and Time
  • S&P

    • 2022
      • Wobfuscator: Obfuscating JavaScript Malware via Opportunistic Translation to WebAssembly
    • 2021
      • Survivalism: Systematic Analysis of Windows Malware Living-Off-The-Land
    • 2020
      • Transcending TRANSCEND: Revisiting Malware Classification in the Presence of Concept Drift
    • 2019
      • X
  • NDSS

    • 2022
      • X
    • 2021
      • Does Every Second Count? Time-based Evolution of Malware Behavior in Sandboxes
      • Differential Training: A Generic Framework to Reduce Label Noises for Android Malware Detection
    • 2020
      • You Are What You Do: Hunting Stealthy Malware via Data Provenance Analysis
      • When Malware is Packin’ Heat; Limits of Machine Learning Classifiers Based on Static Analysis Features
      • Prevalence and Impact of Low-Entropy Packing Schemes in the Malware Ecosystem
    • 2019
      • ExSpectre: Hiding Malware in Speculative Execution

Tier 2

  • RAID

    • 2021
      • Marked for Disruption: Tracing the Evolution of Malware Delivery Operations Targeted for Takedown
    • 2020
      • SourceFinder: Finding Malware Source-Code from Publicly Available Repositories in GitHub
    • 2019
      • Fluorescence: Detecting Kernel-Resident Malware in Clouds
      • Towards Large-Scale Hunting for Android Negative-Day Malware
      • Smart Malware using Leaked Control Data of Robotic Applications: The Case of Raven-II Surgical Robots
      • SGXJail: Defeating Enclave Malware via Confinement
  • ACSAC

    • 2022
      • ...
    • 2021
      • Can We Leverage Predictive Uncertainty to Detect Dataset Shift and Adversarial Examples in Android Malware Detection?
      • Obfuscation Revealed: Leveraging Electromagnetic Signals for Obfuscated Malware Classification
    • 2020
      • The Tangled Genealogy of IoT Malware
      • Spotlight: Malware Lead Generation at Scale
      • AVclass2: Massive Malware Tag Extraction from AV Labels
      • Advanced Windows Methods on Malware Detection and Classification
      • Query-Efficient Black-Box Attack Against Sequence-Based Malware Classifiers
      • StegoNet: Turn Deep Neural Network into a Stegomalware
    • 2019
      • EIGER: Automated IOC Generation for Accurate and Interpretable Endpoint Malware Detection
      • CUBISMO: Decloaking Server-side Malware via Cubist Program Analysis
      • Neurlux: Dynamic Malware Analysis Without Feature Engineering