Eskandari, M. and Hashemi, S. (2011). Metamorphic mal-
ware detection using control flow graph mining. Int.
J. Comput. Sci. Network Secur, 11(12):1–6.
herm1t (2002). Recompiling the metamorphism. https://
83.133.184.251/virensimulation.org/lib/vhe11.html.
Accessed: 2018-11-13.
Idika, N. and Mathur, A. P. (2007). A survey of malware
detection techniques. Purdue University, 48.
Jeong, K. and Lee, H. (2008). Code graph for malware
detection. In 2008 International Conference on Infor-
mation Networking, pages 1–5. IEEE.
Julus, L. (2000). Metamorphism. 29A Magazine, 1(5).
Kinder, J. and Veith, H. (2008). Jakstab: A static anal-
ysis platform for binaries. In International Confer-
ence on Computer Aided Verification, pages 423–427.
Springer.
Kolter, J. Z. and Maloof, M. A. (2004). Learning to de-
tect malicious executables in the wild. In Proceedings
of the tenth ACM SIGKDD international conference
on Knowledge discovery and data mining, pages 470–
478. ACM.
Konstantinou, E. and Wolthusen, S. (2008). Metamorphic
virus: Analysis and detection. Royal Holloway Uni-
versity of London, 15:15.
Kruegel, C., Robertson, W., Valeur, F., and Vigna, G.
(2004). Static disassembly of obfuscated binaries. In
USENIX security Symposium, volume 13, pages 18–
18.
Lakhotia, A. and Mohammed, M. (2004). Imposing order
on program statements to assist anti-virus scanners. In
Reverse Engineering, 2004. Proceedings. 11th Work-
ing Conference on, pages 161–170. IEEE.
Lattner, C. and Adve, V. (2004). Llvm: A compilation
framework for lifelong program analysis & transfor-
mation. In Proceedings of the international sympo-
sium on Code generation and optimization: feedback-
directed and runtime optimization, page 75. IEEE
Computer Society.
Lee, J., Jeong, K., and Lee, H. (2010). Detecting meta-
morphic malwares using code graphs. In Proceedings
of the 2010 ACM symposium on applied computing,
pages 1970–1977. ACM.
Lyda, R. and Hamrock, J. (2007). Using entropy analysis to
find encrypted and packed malware. IEEE Security &
Privacy, 5(2):40–45.
Mohanty, D. (2005). Anti-virus evasion techniques and
countermeasures. Published online at http://www.
hackingspirits. com/eth-hac/papers/whitepapers.
asp., 18.
Moser, A., Kruegel, C., and Kirda, E. (2007). Exploring
multiple execution paths for malware analysis. In Se-
curity and Privacy, 2007. SP’07. IEEE Symposium on,
pages 231–245. IEEE.
Rajaat (1999). Polimorphism. 29A Magazine, 1(3).
Sathyanarayan, V. S., Kohli, P., and Bruhadeshwar, B.
(2008). Signature generation and detection of mal-
ware families. In Australasian Conference on In-
formation Security and Privacy, pages 336–349.
Springer.
Schiffman, M. A brief history of malware obfuscation:
Part 1 of 2. Published online at https://blogs.cisco.
com/security/a brief history of malware obfuscation
part 1 of 2. Accessed: 2018-11-13.
Schiffman, M. A brief history of malware obfuscation:
Part 2 of 2. Published online at https://blogs.cisco.
com/security/a brief history of malware obfuscation
part 2 of 2. Accessed: 2018-11-13.
Schultz, M. G., Eskin, E., Zadok, F., and Stolfo, S. J.
(2001). Data mining methods for detection of new
malicious executables. In Security and Privacy, 2001.
S&P 2001. Proceedings. 2001 IEEE Symposium on,
pages 38–49. IEEE.
Schwarz, B., Debray, S., and Andrews, G. (2002). Disas-
sembly of executable code revisited. In Reverse en-
gineering, 2002. Proceedings. Ninth working confer-
ence on, pages 45–54. IEEE.
Shoshitaishvili, Y., Wang, R., Salls, C., Stephens, N.,
Polino, M., Dutcher, A., Grosen, J., Feng, S., Hauser,
C., Kruegel, C., et al. (2016). Sok:(state of) the art of
war: Offensive techniques in binary analysis. In 2016
IEEE Symposium on Security and Privacy (SP), pages
138–157. IEEE.
Stepan, A. (2006). Improving proactive detection of packed
malware. Virus Bulletin, 1.
Szor, P. and Ferrie, P. (2001). Hunting for metamorphic. In
Virus bulletin conference. Prague.
Troger, J. and Cifuentes, C. (2002). Analysis of virtual
method invocation for binary translation. In Reverse
Engineering, 2002. Proceedings. Ninth Working Con-
ference on, pages 65–74. IEEE.
Walenstein, A., Mathur, R., Chouchane, M. R., and Lakho-
tia, A. (2006). Normalizing metamorphic malware us-
ing term rewriting. In Source Code Analysis and Ma-
nipulation, 2006. SCAM’06. Sixth IEEE International
Workshop on, pages 75–84. IEEE.
Wong, W. and Stamp, M. (2006). Hunting for metamorphic
engines. Journal in Computer Virology, 2(3):211–229.
Xu, L., Sun, F., and Su, Z. (2009). Constructing precise
control flow graphs from binaries. University of Cali-
fornia, Davis, Tech. Rep.
You, I. and Yim, K. (2010). Malware obfuscation tech-
niques: A brief survey. In Broadband, Wireless Com-
puting, Communication and Applications (BWCCA),
2010 International Conference on, pages 297–300.
IEEE.
DATA 2019 - 8th International Conference on Data Science, Technology and Applications
208