EN
Malware Visualization Techniques
Abstract
Malware basically means malicious software that can be an intrusive program code or anything that is designed to perform malicious operations on system and executes malicious actions such as clandestine, listening, monitoring, saving, and deleting without the user's knowledge and consent. Malware review and analysis requires an advanced level of programming knowledge, in-depth file systems knowledge, deep code inspection, and reverse engineering capability. New techniques are needed to reduce indirect costs of malware analysis. This paper aims to provide insights into the malware visualization techniques and its applications, most common malware types and the extracted features that used to identify the malware are demonstrated in this study. In this work, Systematic Literature Review (SLR) conducted to investigate the current state of knowledge about Malware detection techniques, data visualization and malware features. An advanced research has been carried out in most relevant digital libraries for potential published articles. 90 preliminary studies (PS) were determined on the basis of inclusion and exclusion criteria. The analytical study is based mainly on the PSs to achieve the goals. The results clarify the importance of visualization techniques and which are the most common malware as well as the most useful features. Several ways to visualize malware to help malware analysts have been suggested.
Keywords
References
- Zhang, Y., et al., A survey of cyber crimes. Security and Communication Networks, 2012. 5(4): p. 422-437.
- Bazrafshan, Z., et al. A survey on heuristic malware detection techniques. in The 5th Conference on Information and Knowledge Technology. 2013.
- La Polla, M., F. Martinelli, and D. Sgandurra, A Survey on Security for Mobile Devices. IEEE Communications Surveys & Tutorials, 2013. 15(1): p. 446-471.
- Meng, G., et al., Mystique: Evolving Android Malware for Auditing Anti-Malware Tools, in Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security. 2016, ACM: Xi'an, China. p. 365-376.
- Vemparala, S., et al., Malware Detection Using Dynamic Birthmarks, in Proceedings of the 2016 ACM on International Workshop on Security And Privacy Analytics. 2016, ACM: New Orleans, Louisiana, USA. p. 41-46.
- Dang-Pham, D. and S. Pittayachawan, Comparing intention to avoid malware across contexts in a BYOD-enabled Australian university: A Protection Motivation Theory approach. Computers & Security, 2015. 48: p. 281-297.
- Meng, G., et al., Semantic modelling of Android malware for effective malware comprehension, detection, and classification, in Proceedings of the 25th International Symposium on Software Testing and Analysis. 2016, ACM: Saarbrücken, Germany. p. 306-317.
- Han, K., J.H. Lim, and E.G. Im, Malware analysis method using visualization of binary files, in Proceedings of the 2013 Research in Adaptive and Convergent Systems. 2013, ACM: Montreal, Quebec, Canada. p. 317-321.
Details
Primary Language
English
Subjects
Engineering
Journal Section
Research Article
Publication Date
March 31, 2020
Submission Date
February 13, 2019
Acceptance Date
February 13, 2020
Published in Issue
Year 2020 Volume: 8 Number: 1
APA
Efe, A., & Hussin, S. H. S. (2020). Malware Visualization Techniques. International Journal of Applied Mathematics Electronics and Computers, 8(1), 7-20. https://doi.org/10.18100/ijamec.526813
AMA
1.Efe A, Hussin SHS. Malware Visualization Techniques. International Journal of Applied Mathematics Electronics and Computers. 2020;8(1):7-20. doi:10.18100/ijamec.526813
Chicago
Efe, Ahmet, and Saleh Hussin S. Hussin. 2020. “Malware Visualization Techniques”. International Journal of Applied Mathematics Electronics and Computers 8 (1): 7-20. https://doi.org/10.18100/ijamec.526813.
EndNote
Efe A, Hussin SHS (March 1, 2020) Malware Visualization Techniques. International Journal of Applied Mathematics Electronics and Computers 8 1 7–20.
IEEE
[1]A. Efe and S. H. S. Hussin, “Malware Visualization Techniques”, International Journal of Applied Mathematics Electronics and Computers, vol. 8, no. 1, pp. 7–20, Mar. 2020, doi: 10.18100/ijamec.526813.
ISNAD
Efe, Ahmet - Hussin, Saleh Hussin S. “Malware Visualization Techniques”. International Journal of Applied Mathematics Electronics and Computers 8/1 (March 1, 2020): 7-20. https://doi.org/10.18100/ijamec.526813.
JAMA
1.Efe A, Hussin SHS. Malware Visualization Techniques. International Journal of Applied Mathematics Electronics and Computers. 2020;8:7–20.
MLA
Efe, Ahmet, and Saleh Hussin S. Hussin. “Malware Visualization Techniques”. International Journal of Applied Mathematics Electronics and Computers, vol. 8, no. 1, Mar. 2020, pp. 7-20, doi:10.18100/ijamec.526813.
Vancouver
1.Ahmet Efe, Saleh Hussin S. Hussin. Malware Visualization Techniques. International Journal of Applied Mathematics Electronics and Computers. 2020 Mar. 1;8(1):7-20. doi:10.18100/ijamec.526813
Cited By
SAGMAD—A Signature Agnostic Malware Detection System Based on Binary Visualisation and Fuzzy Sets
Electronics
https://doi.org/10.3390/electronics11071044Jadeite: A novel image-behavior-based approach for Java malware detection using deep learning
Computers & Security
https://doi.org/10.1016/j.cose.2021.102547Malware Detection and Classification in Android Application Using Simhash-Based Feature Extraction and Machine Learning
IEEE Access
https://doi.org/10.1109/ACCESS.2024.3501277SPECTRE: a hybrid and adaptive cyber threats detection and response in volatile memory
International Journal of Information Security
https://doi.org/10.1007/s10207-026-01212-6