MALVADA: A framework for generating datasets of malware execution traces
Malware attacks have been growing steadily in recent years, making more sophisticated detection methods necessary. These approaches typically rely on analyzing the behavior of malicious applications, for example by examining execution traces that capture their runtime behavior. However, many existin...
Saved in:
Main Authors: | Razvan Raducu, Alain Villagrasa-Labrador, Ricardo J. Rodríguez, Pedro Álvarez |
---|---|
Format: | Article |
Language: | English |
Published: |
Elsevier
2025-05-01
|
Series: | SoftwareX |
Subjects: | |
Online Access: | http://www.sciencedirect.com/science/article/pii/S2352711025000494 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
HoneyBow:an automated malware collection tool based on the high-interaction honeypot principle
by: ZHUGE Jian-wei1, et al.
Published: (2007-01-01) -
Detecting Obfuscated Malware Infections on Windows Using Ensemble Learning Techniques
by: Yadigar Imamverdiyev, et al.
Published: (2025-01-01) -
A Survey on Adversarial Attacks for Malware Analysis
by: Kshitiz Aryal, et al.
Published: (2025-01-01) -
Method of anti-confusion texture feature descriptor for malware images
by: Yashu LIU, et al.
Published: (2018-11-01) -
Transformer-based malware detection using process resource utilization metrics
by: Dimosthenis Natsos, et al.
Published: (2025-03-01)