Durre Zehra Syeda, Mamoona Naveed Asghar,
... dynamic malware analysis and classification using a malware Portable Executable (PE) file from the MalwareBazaar repository. It suggests ...
Tópico(s): Digital and Cyber Forensics
2024 - Multidisciplinary Digital Publishing Institute | Applied Sciences
Kamran Shaukat, Suhuai Luo, Vijay Varadharajan,
... approaches. First, it translates and visualises each Windows portable executable (PE) file into a coloured image to eliminate ...
Tópico(s): Anomaly Detection Techniques and Applications
2024 - Elsevier BV | Engineering Applications of Artificial Intelligence
Mohamad Mulham Belal, Divya Meena Sundaram,
... from MalImg, Microsoft BIG datasets or converted from portable executable imports. The experiments show that B_ViT variants ...
Tópico(s): Digital Media Forensic Detection
2023 - Institute of Electrical and Electronics Engineers | IEEE Access
Kamran Shaukat, Suhuai Luo, Vijay Varadharajan,
... and dynamic analysis advantages. First, it visualises a portable executable (PE) file as a coloured image. Second, it ...
Tópico(s): Network Security and Intrusion Detection
2023 - Elsevier BV | Engineering Applications of Artificial Intelligence
Priyanka Singh, Samir Kumar Borgohain, Achintya Kumar Sarkar, Jayendra Kumar, Lakhan Dev Sharma,
The portable executable header (PEH) information is commonly used as a feature for malware detection systems to train and validate ...
Tópico(s): Digital Media Forensic Detection
2023 - Wiley | International Journal of Intelligent Systems
Xiang Ling, Lingfei Wu, Jiangyu Zhang, Zhenqing Qu, Wei Deng, Xiang Chen, Yaguan Qian, Chunming Wu, Shouling Ji, Tianyue Luo, Jingzheng Wu, Yanjun Wu,
... focus on malware with the file format of portable executable (PE) in the family of Windows operating systems, ...
Tópico(s): Security and Verification in Computing
2023 - Elsevier BV | Computers & Security
Beomjin Jin, Jusop Choi, Jin B. Hong, Hyoungshick Kim,
... generate fully-working, unseen malware samples on Windows portable executable (PE) files with various perturbations such as code ...
Tópico(s): Software Testing and Debugging Techniques
2023 - Institute of Electrical and Electronics Engineers | IEEE Access
Shuhui Zhang, Changdong Hu, Lianhai Wang, Miodrag J. Mihaljević, Shujiang Xu, Tian Lan,
... in a sandbox, and building a dataset of portable executables in memory through memory forensics. When a process ... utilized for malware analysis instead of the entire portable executable (PE) files. PE file fragments are selected with ...
Tópico(s): Network Security and Intrusion Detection
2023 - Multidisciplinary Digital Publishing Institute | Symmetry
Xabier Ugarte-Pedrero, Igor Santos, Iván García-Ferreira, Sergio Huerta‐Ochoa, Borja Sanz, Pablo G. Bringas,
... not packed binaries using features based on the Portable Executable structure. In this paper, we extend this work ... the discrimination of packed and not packed binaries, Portable Executable structure based features present limitations to distinguish custom ...
Tópico(s): Internet Traffic Analysis and Secure E-voting
2014 - Elsevier BV | Computers & Security
Syed Khurram Jah Rizvi, Warda Aslam, Muhammad Shahzad, Shahzad Saleem, Muhammad Moazam Fraz,
... approach to detect the malware, i.e., malicious Portable Executable (PE). It performs an in-depth analysis of ...
Tópico(s): Digital and Cyber Forensics
2021 - Springer Science+Business Media | Complex & Intelligent Systems
Sachin Jain, Yogesh Kumar Meena,
... detecting malicious code. n–grams are extracted from Portable Executable (PE) of benign and malware samples which is ... feature space. Experiments have been conducted on 2138 Portable Executables (PE) samples and classification is performed using classifiers ...
Tópico(s): Digital and Cyber Forensics
2011 - Springer Science+Business Media | Communications in computer and information science
Nghi Nguyen, Ángel Manuel Gamaza Domínguez, Rajeev Barua,
... our work presents a compiler method whose resulting executable is portable across SPMs of any size. Our technique is to employ a customized installer software, which decides the SPM allocation just before the program's first run, since the SPM size can be discovered at that time. The installer then, based on the decided allocation, modifies the program executable accordingly. The resulting executable places frequently used objects ...
Tópico(s): Low-power high-performance VLSI design
2009 - Association for Computing Machinery | ACM Transactions on Embedded Computing Systems

Caio Moreira, Davi Carvalho Moreira, Claudomiro de S. de Sales,
... apply static analysis to detect ransomware by converting Portable Executable (PE) header files into color images in a ...
Tópico(s): Software Testing and Debugging Techniques
2023 - Elsevier BV | Computers & Security
... a graph is created using the headers of executable files (specifically portable executable files) and then the graph is mapped in ...
Tópico(s): Software Testing and Debugging Techniques
2022 - Springer Science+Business Media | Journal of Computer Virology and Hacking Techniques
Anitta Patience Namanya, Irfan Awan, Jules Pagna Disso, Muhammad Younas,
... hash types currently used in malware analysis for portable executable (PE) files. Although each hashing technique produces interesting ...
Tópico(s): Advanced Steganography and Watermarking Techniques
2019 - Elsevier BV | Future Generation Computer Systems
Ajit Kumar, K. S. Kuppusamy, G. Aghila,
... set has been amalgamated as a combination of portable executable header fields raw value and derived values. Various ...
Tópico(s): Spam and Phishing Detection
2017 - Elsevier BV | Journal of King Saud University - Computer and Information Sciences
Babak Bashari Rad, Maslin Masrom,
... measurements in order to check the likeness of portable executables (PE). The purpose of this research is to ...
Tópico(s): Digital and Cyber Forensics
2011 - Insight Society | International Journal on Advanced Science Engineering and Information Technology
... role in the Internet of Things era, the Portable Executable (PE) format is drawing attention even more widely ...
Tópico(s): Digital and Cyber Forensics
2015 - Science and Engineering Research Support Society | International Journal of Security and Its Applications
Rita Loogen, Francisco López Fraguas, Mario Rodríguez Artalejo,
... translation of CTRS into Prolog, which makes it executable and portable. Moreover, in comparison to related approaches, our method ...
Tópico(s): Logic, programming, and type systems
1993 - Springer Science+Business Media | Lecture notes in computer science
Jie Xu, Lijun Feng, Yalan Ye, Yue Wu,
... data into the palette of bitmap resources of portable executable (PE) files. This algorithm has higher security than ...
Tópico(s): Technology and Security Systems
2012 - Elsevier BV | Journal of Electronic Science and Technology
PE stands for 'portable executable' file format. As the name suggests, the format can be portable across all the 32-bit operating system and can be executed on any version of windows. The format is also ...
Tópico(s): Distributed and Parallel Computing Systems
2009 - Springer Nature | Advances in information security
Hasan H. Al-Khshali, Muhammad Ilyas,
One aspect of cybersecurity, incorporates the study of Portable Executables (PE) files maleficence. Artificial Intelligence (AI) can be ...
Tópico(s): Digital and Cyber Forensics
2022 - | Computers, materials & continua/Computers, materials & continua (Print)
... of use of the registers, characteristics of the Portable Executable file sections, among others. In addition, PE Parser ...
Tópico(s): Digital Media Forensic Detection
2022 - Elsevier BV | Software Impacts
Zhuocheng Yu, Shudong Li, Youming Bai, Weihong Han, Xiaobo Wu, Zhihong Tian,
... import Dlls and import APIs from the original portable executable (PE) file, and uses heterogeneous graph to describe ...
Tópico(s): Anomaly Detection Techniques and Applications
2023 - Institute of Electrical and Electronics Engineers | IEEE Internet of Things Journal
Tópico(s): Spam and Phishing Detection
2016 - Springer Science+Business Media | Lecture notes in computer science
Boyun Zhang, Jianping Yin, Jingbo Hao,
... malicious executable programs that are in the Windows Portable Executable (PE) format as dataset for experiment . After extracting ...
Tópico(s): Network Security and Intrusion Detection
2005 - Springer Science+Business Media | Lecture notes in computer science
Martin Jureček, Róbert Lórencz,
... in the headers of executable files in the portable executable file format.Our experimental results show that our ...
Tópico(s): Anomaly Detection Techniques and Applications
2021 - Institute of Electrical and Electronics Engineers | IEEE Access
Shina Sheen, R. Anitha, P. Sirisha,
... executable that can be extracted include byte ngrams, Portable Executable (PE) features, API call sequences and Strings. After ...
Tópico(s): Anomaly Detection Techniques and Applications
2013 - Elsevier BV | Pattern Recognition Letters
P. Mohan Kumar, K. L. Shunmuganathan,
... executable files we have considered are Windows PE (Portable-Executable) files. Moreover from the experimental results, it is ...
Tópico(s): Digital Media Forensic Detection
2012 - Taylor & Francis | Information Security Journal A Global Perspective
Santosh Jhansi Kattamuri, P. Ravi Kiran Varma, Sujata Chakravarty, Venkata Sai Pavan Madabathula,
... files can be done through the analysis of Portable Executable (PE) application file headers. Benchmark datasets are available ...
Tópico(s): Anomaly Detection Techniques and Applications
2023 - Multidisciplinary Digital Publishing Institute | Electronics