Balogh, Š., Mojžiš, J.: New direction for malware detection using system features. In: 2019 10th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS), vol. 1, pp. 176–183. IEEE (2019)
Google Scholar
Volatility Foundation: The volatility framework. http://www.volatilityfoundation.org. Last Accessed 27 Feb 2021
Barabosch, T., Bergmann, N., Dombeck, A., Padilla, E.: Quincy: detecting host-based code injection attacks in memory dumps. In: Polychronakis, M., Meier, M. (eds.) 14th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, pp. 209–229. Springer, Cham (2017)
CrossRef
Google Scholar
Pék, G., Lázár, Z., Várnagy, Z., Félegyházi, M., Buttyán, L.: Membrane: a posteriori detection of malicious code loading by memory paging analysis. In: Askoxylakis, I., Ioannidis, S., Katsikas, S., Meadows, C. (eds.) 21st European Symposium on Research in Computer Security, pp. 199–216. Springer, Cham (2016)
Google Scholar
Monnappa, K.A.: Detecting deceptive process hollowing techniques Usind Hollowfind volatility plugin. https://cysinfo.com/detecting-deceptive-hollowing-techniques/. Last Accessed 27 Feb 2021
Richard, G.G., III., Case, A.: In lieu of swap: analyzing compressed RAM in Mac OS X and Linux. Digit. Investig. 11(2), S3–S12 (2014)
CrossRef
Google Scholar
Arefi, M.N., et al.: Faros: illuminating in-memory injection attacks via provenance-based whole-system dynamic information flow tracking. In: 2018 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), pp. 231–242. IEEE (2018)
Google Scholar
Barabosch, T., Eschweiler, S., Gerhards-Padilla, E.: Bee master: detecting host-based code injection attacks. In: Dietrich, S. (ed.) 11th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, pp. 235–254. Springer, Cham (2014)
Google Scholar
Ahmad, A., Dey, L.: A feature selection technique for classificatory analysis. Pattern Recognit. Lett. 26(1), 43–56
Google Scholar
Ucci, D., Aniello, L., Baldoni, R.: Survey of machine learning techniques for malware analysis. Comput. Secur. 81, 123–147 (2019)
CrossRef
Google Scholar
Ye, Y., Li, T., Adjeroh, D., Iyengar, S.S.: A survey on malware detection using data mining techniques. ACM Comput. Surv. (CSUR) 50(3), 1–40 (2017)
CrossRef
Google Scholar
Mehta, M., Rissanen, J., Agrawal, R.: MDL-based decision tree pruning. In: Fayyad, U., Uthurusamy, R. (eds.) KDD 1995: Proceedings of the First International Conference on Knowledge Discovery and Data Mining (KDD), vol. 21, no. 2, pp. 216–221. AAAI Press (1995)
Google Scholar
Marsland, S.: Machine Learning: An Algorithmic Perspective, Part 6: Dimensionality Reduction. CRC Press (2009)
Google Scholar