MALVADA: A framework for generating datasets of malware execution traces
Malware attacks have been growing steadily in recent years, making more sophisticated detection methods necessary. These approaches typically rely on analyzing the behavior of malicious applications, for example by examining execution traces that capture their runtime behavior. However, many existin...
Saved in:
Main Authors: | Razvan Raducu, Alain Villagrasa-Labrador, Ricardo J. Rodríguez, Pedro Álvarez |
---|---|
Format: | Article |
Language: | English |
Published: |
Elsevier
2025-05-01
|
Series: | SoftwareX |
Subjects: | |
Online Access: | http://www.sciencedirect.com/science/article/pii/S2352711025000494 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Detecting Obfuscated Malware Infections on Windows Using Ensemble Learning Techniques
by: Yadigar Imamverdiyev, et al.
Published: (2025-01-01) -
Transformer-based malware detection using process resource utilization metrics
by: Dimosthenis Natsos, et al.
Published: (2025-03-01) -
MalHAPGNN: An Enhanced Call Graph-Based Malware Detection Framework Using Hierarchical Attention Pooling Graph Neural Network
by: Wenjie Guo, et al.
Published: (2025-01-01) -
Interpretable Detection of Malicious Behavior in Windows Portable Executables Using Multi-Head 2D Transformers
by: Sohail Khan, et al.
Published: (2024-06-01) -
LinRegDroid: Detection of Android Malware Using Multiple Linear Regression Models-Based Classifiers
by: Durmus Ozkan Sahin, et al.
Published: (2022-01-01)