Publications

Malware analysis through high-level behavior

Abstract

Malware is becoming more and more stealthy to evade detection and analysis. Stealth techniques often involve code transformation, ranging from equivalent code substitution and junk code injection, to continuously transforming code using a polymorphic or a metamorphic engine. Evasion techniques have a great impact on signature-based malware detection, making it very costly and often unsuccessful.

Date
September 12, 2025
Authors
Xiyue Deng, Jelena Mirkovic
Conference
11th USENIX Workshop on Cyber Security Experimentation and Test (CSET 18)