Limpar
314 resultados

Acesso aberto

Tipo do recurso

Ano de criação

Produção nacional

Revisado por pares

Áreas

Idioma

Editores

Artigo Acesso aberto Revisado por pares

Durre Zehra Syeda, Mamoona Naveed Asghar,

... dynamic malware analysis and classification using a malware Portable Executable (PE) file from the MalwareBazaar repository. It suggests ...

Tópico(s): Digital and Cyber Forensics

2024 - Multidisciplinary Digital Publishing Institute | Applied Sciences

Artigo Acesso aberto Revisado por pares

Kamran Shaukat, Suhuai Luo, Vijay Varadharajan,

... approaches. First, it translates and visualises each Windows portable executable (PE) file into a coloured image to eliminate ...

Tópico(s): Anomaly Detection Techniques and Applications

2024 - Elsevier BV | Engineering Applications of Artificial Intelligence

Artigo Acesso aberto Revisado por pares

Mohamad Mulham Belal, Divya Meena Sundaram,

... from MalImg, Microsoft BIG datasets or converted from portable executable imports. The experiments show that B_ViT variants ...

Tópico(s): Digital Media Forensic Detection

2023 - Institute of Electrical and Electronics Engineers | IEEE Access

Artigo Revisado por pares

Kamran Shaukat, Suhuai Luo, Vijay Varadharajan,

... and dynamic analysis advantages. First, it visualises a portable executable (PE) file as a coloured image. Second, it ...

Tópico(s): Network Security and Intrusion Detection

2023 - Elsevier BV | Engineering Applications of Artificial Intelligence

Artigo Acesso aberto Revisado por pares

Priyanka Singh, Samir Kumar Borgohain, Achintya Kumar Sarkar, Jayendra Kumar, Lakhan Dev Sharma,

The portable executable header (PEH) information is commonly used as a feature for malware detection systems to train and validate ...

Tópico(s): Digital Media Forensic Detection

2023 - Wiley | International Journal of Intelligent Systems

Artigo Acesso aberto Revisado por pares

Xiang Ling, Lingfei Wu, Jiangyu Zhang, Zhenqing Qu, Wei Deng, Xiang Chen, Yaguan Qian, Chunming Wu, Shouling Ji, Tianyue Luo, Jingzheng Wu, Yanjun Wu,

... focus on malware with the file format of portable executable (PE) in the family of Windows operating systems, ...

Tópico(s): Security and Verification in Computing

2023 - Elsevier BV | Computers & Security

Artigo Acesso aberto Revisado por pares

Beomjin Jin, Jusop Choi, Jin B. Hong, Hyoungshick Kim,

... generate fully-working, unseen malware samples on Windows portable executable (PE) files with various perturbations such as code ...

Tópico(s): Software Testing and Debugging Techniques

2023 - Institute of Electrical and Electronics Engineers | IEEE Access

Artigo Acesso aberto Revisado por pares

Shuhui Zhang, Changdong Hu, Lianhai Wang, Miodrag J. Mihaljević, Shujiang Xu, Tian Lan,

... in a sandbox, and building a dataset of portable executables in memory through memory forensics. When a process ... utilized for malware analysis instead of the entire portable executable (PE) files. PE file fragments are selected with ...

Tópico(s): Network Security and Intrusion Detection

2023 - Multidisciplinary Digital Publishing Institute | Symmetry

Artigo Revisado por pares

Xabier Ugarte-Pedrero, Igor Santos, Iván García-Ferreira, Sergio Huerta‐Ochoa, Borja Sanz, Pablo G. Bringas,

... not packed binaries using features based on the Portable Executable structure. In this paper, we extend this work ... the discrimination of packed and not packed binaries, Portable Executable structure based features present limitations to distinguish custom ...

Tópico(s): Internet Traffic Analysis and Secure E-voting

2014 - Elsevier BV | Computers & Security

Artigo Acesso aberto Revisado por pares

Syed Khurram Jah Rizvi, Warda Aslam, Muhammad Shahzad, Shahzad Saleem, Muhammad Moazam Fraz,

... approach to detect the malware, i.e., malicious Portable Executable (PE). It performs an in-depth analysis of ...

Tópico(s): Digital and Cyber Forensics

2021 - Springer Science+Business Media | Complex & Intelligent Systems

Capítulo de livro Revisado por pares

Sachin Jain, Yogesh Kumar Meena,

... detecting malicious code. n–grams are extracted from Portable Executable (PE) of benign and malware samples which is ... feature space. Experiments have been conducted on 2138 Portable Executables (PE) samples and classification is performed using classifiers ...

Tópico(s): Digital and Cyber Forensics

2011 - Springer Science+Business Media | Communications in computer and information science

Artigo Acesso aberto Revisado por pares

Nghi Nguyen, Ángel Manuel Gamaza Domínguez, Rajeev Barua,

... our work presents a compiler method whose resulting executable is portable across SPMs of any size. Our technique is to employ a customized installer software, which decides the SPM allocation just before the program's first run, since the SPM size can be discovered at that time. The installer then, based on the decided allocation, modifies the program executable accordingly. The resulting executable places frequently used objects ...

Tópico(s): Low-power high-performance VLSI design

2009 - Association for Computing Machinery | ACM Transactions on Embedded Computing Systems

Artigo Brasil Produção Nacional Revisado por pares

Caio Moreira, Davi Carvalho Moreira, Claudomiro de S. de Sales,

... apply static analysis to detect ransomware by converting Portable Executable (PE) header files into color images in a ...

Tópico(s): Software Testing and Debugging Techniques

2023 - Elsevier BV | Computers & Security

Artigo

Farnoush Manavi, Ali Hamzeh,

... a graph is created using the headers of executable files (specifically portable executable files) and then the graph is mapped in ...

Tópico(s): Software Testing and Debugging Techniques

2022 - Springer Science+Business Media | Journal of Computer Virology and Hacking Techniques

Artigo Acesso aberto Revisado por pares

Anitta Patience Namanya, Irfan Awan, Jules Pagna Disso, Muhammad Younas,

... hash types currently used in malware analysis for portable executable (PE) files. Although each hashing technique produces interesting ...

Tópico(s): Advanced Steganography and Watermarking Techniques

2019 - Elsevier BV | Future Generation Computer Systems

Artigo Acesso aberto Revisado por pares

Ajit Kumar, K. S. Kuppusamy, G. Aghila,

... set has been amalgamated as a combination of portable executable header fields raw value and derived values. Various ...

Tópico(s): Spam and Phishing Detection

2017 - Elsevier BV | Journal of King Saud University - Computer and Information Sciences

Artigo Acesso aberto Revisado por pares

Babak Bashari Rad, Maslin Masrom,

... measurements in order to check the likeness of portable executables (PE). The purpose of this research is to ...

Tópico(s): Digital and Cyber Forensics

2011 - Insight Society | International Journal on Advanced Science Engineering and Information Technology

Artigo Acesso aberto

June Ho Yang, Yeonseung Ryu,

... role in the Internet of Things era, the Portable Executable (PE) format is drawing attention even more widely ...

Tópico(s): Digital and Cyber Forensics

2015 - Science and Engineering Research Support Society | International Journal of Security and Its Applications

Capítulo de livro Revisado por pares

Rita Loogen, Francisco López Fraguas, Mario Rodríguez Artalejo,

... translation of CTRS into Prolog, which makes it executable and portable. Moreover, in comparison to related approaches, our method ...

Tópico(s): Logic, programming, and type systems

1993 - Springer Science+Business Media | Lecture notes in computer science

Artigo Revisado por pares

Jie Xu, Lijun Feng, Yalan Ye, Yue Wu,

... data into the palette of bitmap resources of portable executable (PE) files. This algorithm has higher security than ...

Tópico(s): Technology and Security Systems

2012 - Elsevier BV | Journal of Electronic Science and Technology

Capítulo de livro

Abhishek Singh,

PE stands for 'portable executable' file format. As the name suggests, the format can be portable across all the 32-bit operating system and can be executed on any version of windows. The format is also ...

Tópico(s): Distributed and Parallel Computing Systems

2009 - Springer Nature | Advances in information security

Artigo Acesso aberto

Hasan H. Al-Khshali, Muhammad Ilyas,

One aspect of cybersecurity, incorporates the study of Portable Executables (PE) files maleficence. Artificial Intelligence (AI) can be ...

Tópico(s): Digital and Cyber Forensics

2022 - | Computers, materials & continua/Computers, materials & continua (Print)

Artigo Acesso aberto Revisado por pares

Daniel Gibert,

... of use of the registers, characteristics of the Portable Executable file sections, among others. In addition, PE Parser ...

Tópico(s): Digital Media Forensic Detection

2022 - Elsevier BV | Software Impacts

Artigo

Zhuocheng Yu, Shudong Li, Youming Bai, Weihong Han, Xiaobo Wu, Zhihong Tian,

... import Dlls and import APIs from the original portable executable (PE) file, and uses heterogeneous graph to describe ...

Tópico(s): Anomaly Detection Techniques and Applications

2023 - Institute of Electrical and Electronics Engineers | IEEE Internet of Things Journal

Capítulo de livro Revisado por pares

Saba Awan, Nazar Abbas Saqib,

Tópico(s): Spam and Phishing Detection

2016 - Springer Science+Business Media | Lecture notes in computer science

Capítulo de livro Revisado por pares

Boyun Zhang, Jianping Yin, Jingbo Hao,

... malicious executable programs that are in the Windows Portable Executable (PE) format as dataset for experiment . After extracting ...

Tópico(s): Network Security and Intrusion Detection

2005 - Springer Science+Business Media | Lecture notes in computer science

Artigo Acesso aberto Revisado por pares

Martin Jureček, Róbert Lórencz,

... in the headers of executable files in the portable executable file format.Our experimental results show that our ...

Tópico(s): Anomaly Detection Techniques and Applications

2021 - Institute of Electrical and Electronics Engineers | IEEE Access

Artigo Revisado por pares

Shina Sheen, R. Anitha, P. Sirisha,

... executable that can be extracted include byte ngrams, Portable Executable (PE) features, API call sequences and Strings. After ...

Tópico(s): Anomaly Detection Techniques and Applications

2013 - Elsevier BV | Pattern Recognition Letters

Artigo Revisado por pares

P. Mohan Kumar, K. L. Shunmuganathan,

... executable files we have considered are Windows PE (Portable-Executable) files. Moreover from the experimental results, it is ...

Tópico(s): Digital Media Forensic Detection

2012 - Taylor & Francis | Information Security Journal A Global Perspective

Artigo Acesso aberto Revisado por pares

Santosh Jhansi Kattamuri, P. Ravi Kiran Varma, Sujata Chakravarty, Venkata Sai Pavan Madabathula,

... files can be done through the analysis of Portable Executable (PE) application file headers. Benchmark datasets are available ...

Tópico(s): Anomaly Detection Techniques and Applications

2023 - Multidisciplinary Digital Publishing Institute | Electronics