Affiliation:
1. Adana Alparsalan Turkes Science and Technology University, Turkey
Abstract
As corporations are stepping into the new digital transformation age and adopting leading-edge technologies such as cloud, mobile, and big data, it becomes crucial for them to contemplate the risks and rewards of this adoption. At the same time, the new wave of malware attacks is posing a severe impediment in implementing these technologies. This chapter discusses some of the complications, challenges, and issues plaguing current malware analysis and detection techniques. Some of the key challenges discussed are automation, native code, obfuscations, morphing, and anti-reverse engineering. Solutions and recommendations are provided to solve some of these challenges. To stimulate further research in this thriving area, the authors highlight some promising future research directions. The authors believe that this chapter provides an auspicious basis for future researchers who intend to know more about the evolution of malware and will act as a motivation for enhancing the current and developing the new techniques for malware analysis and detection.
Reference24 articles.
1. Aho, A. V., Lam, M. S., Sethi, R., & Ullman, J. D. (2007). Compilers: Principles, techniques, and tools (2nd ed.). Academic Press.
2. MAIL: Malware Analysis Intermediate Language
3. Alam, S., Qu, Z., Riley, R., Chen, Y., & Rastogi, V. (2017). DroidNative: Automating and optimizing detection of Android native code malware variants. Computers & Security, 65, 230-246.
4. DroidClone: Attack of the android malware clones - a step towards stopping them
5. In-Cloud Malware Analysis and Detection