Durre Zehra Syeda, Mamoona Naveed Asghar,
... dynamic malware analysis and classification using a malware Portable Executable (PE) file from the MalwareBazaar repository. It suggests ...
Tópico(s): Digital and Cyber Forensics
2024 - Multidisciplinary Digital Publishing Institute | Applied Sciences
Matouš Kozák, Martin Jureček, Mark Stamp, Fabio Di Troia,
... discovered that random application of our functionality-preserving portable executable modifications successfully evades leading antivirus engines, with an ...
Tópico(s): Network Security and Intrusion Detection
2024 - Springer Science+Business Media | Journal of Computer Virology and Hacking Techniques
Kamran Shaukat, Suhuai Luo, Vijay Varadharajan,
... approaches. First, it translates and visualises each Windows portable executable (PE) file into a coloured image to eliminate ...
Tópico(s): Anomaly Detection Techniques and Applications
2024 - Elsevier BV | Engineering Applications of Artificial Intelligence
Mingcan Cen, XiZhen Deng, Frank Jiang, Robin Doss,
... attacks in the early stage. ZRS leverages the portable executable header (PE header) feature from executable files to ...
Tópico(s): Anomaly Detection Techniques and Applications
2024 - Elsevier BV | Computers & Security
Shuhui Zhang, Changdong Hu, Lianhai Wang, Miodrag J. Mihaljević, Shujiang Xu, Tian Lan,
... in a sandbox, and building a dataset of portable executables in memory through memory forensics. When a process ... utilized for malware analysis instead of the entire portable executable (PE) files. PE file fragments are selected with ...
Tópico(s): Network Security and Intrusion Detection
2023 - Multidisciplinary Digital Publishing Institute | Symmetry
Xabier Ugarte-Pedrero, Igor Santos, Iván García-Ferreira, Sergio Huerta‐Ochoa, Borja Sanz, Pablo G. Bringas,
... not packed binaries using features based on the Portable Executable structure. In this paper, we extend this work ... the discrimination of packed and not packed binaries, Portable Executable structure based features present limitations to distinguish custom ...
Tópico(s): Internet Traffic Analysis and Secure E-voting
2014 - Elsevier BV | Computers & Security
Ali Alqahtani, Sumayya Azzony, Leen Alsharafi, Maha Alaseri,
... 1D-CNN due to the nature of the portable executable file. Significantly, static analysis aligns perfectly with our ... allowing us to uncover static features within the portable executable header. This choice holds particular significance given the ...
Tópico(s): Adversarial Robustness in Machine Learning
2023 - | Digital
Syed Khurram Jah Rizvi, Warda Aslam, Muhammad Shahzad, Shahzad Saleem, Muhammad Moazam Fraz,
... approach to detect the malware, i.e., malicious Portable Executable (PE). It performs an in-depth analysis of ...
Tópico(s): Digital and Cyber Forensics
2021 - Springer Science+Business Media | Complex & Intelligent Systems
Sachin Jain, Yogesh Kumar Meena,
... detecting malicious code. n–grams are extracted from Portable Executable (PE) of benign and malware samples which is ... feature space. Experiments have been conducted on 2138 Portable Executables (PE) samples and classification is performed using classifiers ...
Tópico(s): Digital and Cyber Forensics
2011 - Springer Science+Business Media | Communications in computer and information science
Nghi Nguyen, Ángel Manuel Gamaza Domínguez, Rajeev Barua,
... our work presents a compiler method whose resulting executable is portable across SPMs of any size. Our technique is to employ a customized installer software, which decides the SPM allocation just before the program's first run, since the SPM size can be discovered at that time. The installer then, based on the decided allocation, modifies the program executable accordingly. The resulting executable places frequently used objects ...
Tópico(s): Low-power high-performance VLSI design
2009 - Association for Computing Machinery | ACM Transactions on Embedded Computing Systems
Anitta Patience Namanya, Irfan Awan, Jules Pagna Disso, Muhammad Younas,
... hash types currently used in malware analysis for portable executable (PE) files. Although each hashing technique produces interesting ...
Tópico(s): Advanced Steganography and Watermarking Techniques
2019 - Elsevier BV | Future Generation Computer Systems

Caio Moreira, Davi Carvalho Moreira, Claudomiro de S. de Sales,
... apply static analysis to detect ransomware by converting Portable Executable (PE) header files into color images in a ...
Tópico(s): Software Testing and Debugging Techniques
2023 - Elsevier BV | Computers & Security
... a graph is created using the headers of executable files (specifically portable executable files) and then the graph is mapped in ...
Tópico(s): Software Testing and Debugging Techniques
2022 - Springer Science+Business Media | Journal of Computer Virology and Hacking Techniques
Ajit Kumar, K. S. Kuppusamy, G. Aghila,
... set has been amalgamated as a combination of portable executable header fields raw value and derived values. Various ...
Tópico(s): Spam and Phishing Detection
2017 - Elsevier BV | Journal of King Saud University - Computer and Information Sciences
Babak Bashari Rad, Maslin Masrom,
... measurements in order to check the likeness of portable executables (PE). The purpose of this research is to ...
Tópico(s): Digital and Cyber Forensics
2011 - Insight Society | International Journal on Advanced Science Engineering and Information Technology
... role in the Internet of Things era, the Portable Executable (PE) format is drawing attention even more widely ...
Tópico(s): Digital and Cyber Forensics
2015 - Science and Engineering Research Support Society | International Journal of Security and Its Applications
Rita Loogen, Francisco López Fraguas, Mario Rodríguez Artalejo,
... translation of CTRS into Prolog, which makes it executable and portable. Moreover, in comparison to related approaches, our method ...
Tópico(s): Logic, programming, and type systems
1993 - Springer Science+Business Media | Lecture notes in computer science
Jie Xu, Lijun Feng, Yalan Ye, Yue Wu,
... data into the palette of bitmap resources of portable executable (PE) files. This algorithm has higher security than ...
Tópico(s): Technology and Security Systems
2012 - Elsevier BV | Journal of Electronic Science and Technology
Faiza Babar Khan, Muhammad Hanif Durad, Asifullah Khan, Farrukh Aslam Khan, Sajjad Hussain Chauhdary, Mohammed A. Alqarni,
... of malware are found in the form of Portable Executable (PE) files. While there are various formats of ... scores that lead to improved classification. We use Portable Executable (PE) file formats, i.e., ocx, acm, com ...
Tópico(s): Advanced Malware Detection Techniques
2023 - Institute of Electrical and Electronics Engineers | IEEE Access
PE stands for 'portable executable' file format. As the name suggests, the format can be portable across all the 32-bit operating system and can be executed on any version of windows. The format is also ...
Tópico(s): Distributed and Parallel Computing Systems
2009 - Springer Nature | Advances in information security
T. Dam, N. Nguyen, Viet Trung Le, Tran Duc Le, Sylvestre Uwizeyemungu, Thang Le Dinh,
... leveraging machine learning to encode critical information from Portable Executable (PE) headers into visual representations of ransomware samples. ...
Tópico(s): Digital and Cyber Forensics
2024 - Verlag der Technischen Universität Graz | JUCS - Journal of Universal Computer Science
Hasan H. Al-Khshali, Muhammad Ilyas,
One aspect of cybersecurity, incorporates the study of Portable Executables (PE) files maleficence. Artificial Intelligence (AI) can be ...
Tópico(s): Digital and Cyber Forensics
2022 - | Computers, materials & continua/Computers, materials & continua (Print)
... of use of the registers, characteristics of the Portable Executable file sections, among others. In addition, PE Parser ...
Tópico(s): Digital Media Forensic Detection
2022 - Elsevier BV | Software Impacts
Sharoug Alzaidy, Hamad Binsalleeh,
... This paper presents a method for classifying Windows portable executables (PEs) using Recurrent Neural Networks (RNNs) and Convolutional ...
Tópico(s): Security and Verification in Computing
2024 - Multidisciplinary Digital Publishing Institute | Applied Sciences
Muhammad Imran, Annalisa Appice, Donato Malerba,
... namely MalConv and LGBM, learned to recognise Windows Portable Executable (PE) malware files. Specifically, MalConv is a Convolutional ...
Tópico(s): Anomaly Detection Techniques and Applications
2024 - Multidisciplinary Digital Publishing Institute | Future Internet
Lichen Jia, Yang Yang, Bowen Tang, Zihan Jiang,
... classification as malicious by LB-MDS. However, existing portable executable (PE) malware datasets primarily use a single obfuscation ...
Tópico(s): Network Security and Intrusion Detection
2023 - Elsevier BV | BenchCouncil Transactions on Benchmarks Standards and Evaluations
Tópico(s): Spam and Phishing Detection
2016 - Springer Science+Business Media | Lecture notes in computer science
Boyun Zhang, Jianping Yin, Jingbo Hao,
... malicious executable programs that are in the Windows Portable Executable (PE) format as dataset for experiment . After extracting ...
Tópico(s): Network Security and Intrusion Detection
2005 - Springer Science+Business Media | Lecture notes in computer science
Martin Jureček, Róbert Lórencz,
... in the headers of executable files in the portable executable file format.Our experimental results show that our ...
Tópico(s): Anomaly Detection Techniques and Applications
2021 - Institute of Electrical and Electronics Engineers | IEEE Access
Shina Sheen, R. Anitha, P. Sirisha,
... executable that can be extracted include byte ngrams, Portable Executable (PE) features, API call sequences and Strings. After ...
Tópico(s): Anomaly Detection Techniques and Applications
2013 - Elsevier BV | Pattern Recognition Letters