{"id":"https://openalex.org/W7124845485","doi":"https://doi.org/10.1109/access.2026.3656242","title":"Machine Learning-Enhanced Malware Obfuscation and Innovative Defense Strategies","display_name":"Machine Learning-Enhanced Malware Obfuscation and Innovative Defense Strategies","publication_year":2026,"publication_date":"2026-01-01","ids":{"openalex":"https://openalex.org/W7124845485","doi":"https://doi.org/10.1109/access.2026.3656242"},"language":null,"primary_location":{"id":"doi:10.1109/access.2026.3656242","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2026.3656242","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.1109/access.2026.3656242","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Preet Kanwal","orcid":"https://orcid.org/0000-0002-7490-0090"},"institutions":[{"id":"https://openalex.org/I196608512","display_name":"PES University","ror":"https://ror.org/05m169e78","country_code":"IN","type":"education","lineage":["https://openalex.org/I196608512"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Preet Kanwal","raw_affiliation_strings":["Department of CSE, PES University, Bengaluru, India"],"raw_orcid":"https://orcid.org/0000-0002-7490-0090","affiliations":[{"raw_affiliation_string":"Department of CSE, PES University, Bengaluru, India","institution_ids":["https://openalex.org/I196608512"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5103957360","display_name":"Tejas Kumar","orcid":null},"institutions":[{"id":"https://openalex.org/I196608512","display_name":"PES University","ror":"https://ror.org/05m169e78","country_code":"IN","type":"education","lineage":["https://openalex.org/I196608512"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Tejas A. Kumar","raw_affiliation_strings":["Department of CSE, PES University, Bengaluru, India"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of CSE, PES University, Bengaluru, India","institution_ids":["https://openalex.org/I196608512"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5121048898","display_name":"Sanjay Sunil","orcid":null},"institutions":[{"id":"https://openalex.org/I196608512","display_name":"PES University","ror":"https://ror.org/05m169e78","country_code":"IN","type":"education","lineage":["https://openalex.org/I196608512"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Sanjay Sunil","raw_affiliation_strings":["Department of CSE, PES University, Bengaluru, India"],"raw_orcid":"https://orcid.org/0009-0008-8271-3122","affiliations":[{"raw_affiliation_string":"Department of CSE, PES University, Bengaluru, India","institution_ids":["https://openalex.org/I196608512"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5123390547","display_name":"Srimanish Chandrasekaran","orcid":null},"institutions":[{"id":"https://openalex.org/I196608512","display_name":"PES University","ror":"https://ror.org/05m169e78","country_code":"IN","type":"education","lineage":["https://openalex.org/I196608512"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Srimanish Chandrasekaran","raw_affiliation_strings":["Department of CSE, PES University, Bengaluru, India"],"raw_orcid":"https://orcid.org/0009-0009-3035-3310","affiliations":[{"raw_affiliation_string":"Department of CSE, PES University, Bengaluru, India","institution_ids":["https://openalex.org/I196608512"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5123397470","display_name":"Sajal Jaiswal","orcid":null},"institutions":[{"id":"https://openalex.org/I196608512","display_name":"PES University","ror":"https://ror.org/05m169e78","country_code":"IN","type":"education","lineage":["https://openalex.org/I196608512"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Sajal Jaiswal","raw_affiliation_strings":["Department of CSE, PES University, Bengaluru, India"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of CSE, PES University, Bengaluru, India","institution_ids":["https://openalex.org/I196608512"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5058067360","display_name":"Prasad B. Honnavalli","orcid":"https://orcid.org/0000-0001-7493-6221"},"institutions":[{"id":"https://openalex.org/I196608512","display_name":"PES University","ror":"https://ror.org/05m169e78","country_code":"IN","type":"education","lineage":["https://openalex.org/I196608512"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Prasad B. Honnavalli","raw_affiliation_strings":["Department of CSE, PES University, Bengaluru, India"],"raw_orcid":"https://orcid.org/0000-0001-7493-6221","affiliations":[{"raw_affiliation_string":"Department of CSE, PES University, Bengaluru, India","institution_ids":["https://openalex.org/I196608512"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5123445759","display_name":"S S Iyengar","orcid":null},"institutions":[{"id":"https://openalex.org/I19700959","display_name":"Florida International University","ror":"https://ror.org/02gz6gg07","country_code":"US","type":"education","lineage":["https://openalex.org/I19700959"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"S. S. Iyengar","raw_affiliation_strings":["Knight Foundation School of Computing and Information Sciences, Florida International University, Miami, FL, USA"],"raw_orcid":"https://orcid.org/0000-0003-2944-8178","affiliations":[{"raw_affiliation_string":"Knight Foundation School of Computing and Information Sciences, Florida International University, Miami, FL, USA","institution_ids":["https://openalex.org/I19700959"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":7,"corresponding_author_ids":[],"corresponding_institution_ids":["https://openalex.org/I196608512"],"apc_list":{"value":1850,"currency":"USD","value_usd":1850},"apc_paid":{"value":1850,"currency":"USD","value_usd":1850},"fwci":38.2578,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.9869281,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":98},"biblio":{"volume":"14","issue":null,"first_page":"12605","last_page":"12627"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9628000259399414,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9628000259399414,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.019300000742077827,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.003700000001117587,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.8567000031471252},{"id":"https://openalex.org/keywords/obfuscation","display_name":"Obfuscation","score":0.7983999848365784},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.7088000178337097},{"id":"https://openalex.org/keywords/cryptovirology","display_name":"Cryptovirology","score":0.7034000158309937},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5188000202178955},{"id":"https://openalex.org/keywords/adversarial-machine-learning","display_name":"Adversarial machine learning","score":0.5044999718666077},{"id":"https://openalex.org/keywords/attack-surface","display_name":"Attack surface","score":0.4894999861717224},{"id":"https://openalex.org/keywords/executable","display_name":"Executable","score":0.48429998755455017}],"concepts":[{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.8567000031471252},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.840499997138977},{"id":"https://openalex.org/C40305131","wikidata":"https://www.wikidata.org/wiki/Q2616305","display_name":"Obfuscation","level":2,"score":0.7983999848365784},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.7088000178337097},{"id":"https://openalex.org/C84525096","wikidata":"https://www.wikidata.org/wiki/Q3506050","display_name":"Cryptovirology","level":3,"score":0.7034000158309937},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7017999887466431},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5188000202178955},{"id":"https://openalex.org/C2778403875","wikidata":"https://www.wikidata.org/wiki/Q20312394","display_name":"Adversarial machine learning","level":3,"score":0.5044999718666077},{"id":"https://openalex.org/C2776576444","wikidata":"https://www.wikidata.org/wiki/Q303569","display_name":"Attack surface","level":2,"score":0.4894999861717224},{"id":"https://openalex.org/C160145156","wikidata":"https://www.wikidata.org/wiki/Q778586","display_name":"Executable","level":2,"score":0.48429998755455017},{"id":"https://openalex.org/C127705205","wikidata":"https://www.wikidata.org/wiki/Q5748245","display_name":"Heuristics","level":2,"score":0.4449000060558319},{"id":"https://openalex.org/C10144332","wikidata":"https://www.wikidata.org/wiki/Q14645","display_name":"Rootkit","level":3,"score":0.42660000920295715},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.39419999718666077},{"id":"https://openalex.org/C2779585090","wikidata":"https://www.wikidata.org/wiki/Q3457762","display_name":"Resilience (materials science)","level":2,"score":0.37619999051094055},{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.3458000123500824},{"id":"https://openalex.org/C118463975","wikidata":"https://www.wikidata.org/wiki/Q220849","display_name":"Digital signature","level":3,"score":0.30790001153945923},{"id":"https://openalex.org/C2779395397","wikidata":"https://www.wikidata.org/wiki/Q15731404","display_name":"Malware analysis","level":3,"score":0.30149999260902405},{"id":"https://openalex.org/C2777667771","wikidata":"https://www.wikidata.org/wiki/Q926331","display_name":"Ransomware","level":3,"score":0.2971999943256378},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.2874000072479248},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.26579999923706055},{"id":"https://openalex.org/C86844869","wikidata":"https://www.wikidata.org/wiki/Q2798820","display_name":"Hacker","level":2,"score":0.25589999556541443}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/access.2026.3656242","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2026.3656242","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.1109/access.2026.3656242","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2026.3656242","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"sustainable_development_goals":[{"score":0.6060060858726501,"id":"https://metadata.un.org/sdg/9","display_name":"Industry, innovation and infrastructure"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":64,"referenced_works":["https://openalex.org/W2119954997","https://openalex.org/W2544186342","https://openalex.org/W2784813287","https://openalex.org/W2803224943","https://openalex.org/W2805262980","https://openalex.org/W2807492724","https://openalex.org/W2886581636","https://openalex.org/W2895892359","https://openalex.org/W2900633536","https://openalex.org/W2921353139","https://openalex.org/W2955364291","https://openalex.org/W2955866047","https://openalex.org/W2983738429","https://openalex.org/W2991327923","https://openalex.org/W2997191565","https://openalex.org/W3015563932","https://openalex.org/W3034577585","https://openalex.org/W3047103688","https://openalex.org/W3047506756","https://openalex.org/W3080622597","https://openalex.org/W3082575476","https://openalex.org/W3128227591","https://openalex.org/W3128607711","https://openalex.org/W3134311463","https://openalex.org/W3161810785","https://openalex.org/W3170525725","https://openalex.org/W3175941285","https://openalex.org/W3208113910","https://openalex.org/W3212172514","https://openalex.org/W3214977413","https://openalex.org/W3216759837","https://openalex.org/W4205449174","https://openalex.org/W4210984095","https://openalex.org/W4211108978","https://openalex.org/W4221004703","https://openalex.org/W4221098431","https://openalex.org/W4240858825","https://openalex.org/W4254260640","https://openalex.org/W4283214123","https://openalex.org/W4285124635","https://openalex.org/W4285238371","https://openalex.org/W4311853072","https://openalex.org/W4312622353","https://openalex.org/W4312707592","https://openalex.org/W4320147968","https://openalex.org/W4320490818","https://openalex.org/W4321787264","https://openalex.org/W4365505506","https://openalex.org/W4366126803","https://openalex.org/W4387025507","https://openalex.org/W4388168456","https://openalex.org/W4389612565","https://openalex.org/W4391128915","https://openalex.org/W4399801779","https://openalex.org/W4405838446","https://openalex.org/W4406793950","https://openalex.org/W4407127082","https://openalex.org/W4407155335","https://openalex.org/W4408462771","https://openalex.org/W4408856098","https://openalex.org/W4409019052","https://openalex.org/W4409133320","https://openalex.org/W4410849471","https://openalex.org/W6960057927"],"related_works":[],"abstract_inverted_index":{"In":[0],"the":[1,136,167,181],"evolving":[2],"landscape":[3],"of":[4,71,82,112,139,169,183,195],"sustainable":[5],"digital":[6,170],"technologies,":[7],"safeguarding":[8],"cyber-ecosystems":[9],"has":[10],"become":[11],"a":[12,40,49,184,200],"critical":[13],"priority.":[14],"Traditional":[15],"machine":[16,42],"learning-based":[17],"malware":[18,44,80,187,204],"detection":[19,85,121],"systems":[20,101],"are":[21,90],"increasingly":[22],"ineffective":[23],"against":[24,172],"sophisticated":[25],"adversarial":[26],"techniques":[27,67],"that":[28,161],"exploit":[29],"system-level":[30],"vulnerabilities":[31],"and":[32,47,68,97,115,165,192,198,206],"bypass":[33],"standard":[34],"security":[35,117],"protocols.":[36],"This":[37],"paper":[38],"introduces":[39],"novel":[41],"learning-driven":[43],"obfuscation":[45],"methodology":[46],"proposes":[48],"comprehensive":[50],"defense":[51,159],"strategy":[52],"to":[53,126],"counteract":[54],"such":[55],"threats.":[56,175],"By":[57],"leveraging":[58],"Generative":[59],"Adversarial":[60],"Networks":[61],"(GANs),":[62],"combined":[63],"with":[64,102],"advanced":[65,173],"encryption":[66,127],"structural":[69],"modifications":[70],"Portable":[72],"Executable":[73],"(PE)":[74],"files,":[75],"we":[76,155],"generate":[77],"highly":[78],"obfuscated":[79,196],"capable":[81],"evading":[83],"conventional":[84],"mechanisms.":[86],"These":[87],"malicious":[88],"payloads":[89],"engineered":[91],"for":[92,203],"stealth,":[93],"enabling":[94,189],"seamless":[95],"reconstruction":[96],"execution":[98,149],"on":[99],"target":[100],"minimal":[103],"user":[104],"interaction,":[105],"while":[106],"remaining":[107],"undetected":[108],"by":[109],"over":[110],"90%":[111],"existing":[113],"antivirus":[114],"endpoint":[116,163],"solutions.":[118],"The":[119],"residual":[120],"rate":[122],"is":[123,178],"largely":[124],"attributable":[125],"heuristics":[128],"rather":[129],"than":[130],"behavioral":[131,193],"indicators.":[132],"We":[133],"also":[134],"underscore":[135],"often-overlooked":[137],"role":[138],"executable":[140],"author":[141],"privileges":[142],"in":[143],"facilitating":[144],"unauthorized":[145],"access":[146],"through":[147,180],"privilege-aware":[148],"flows.":[150],"To":[151],"mitigate":[152],"these":[153],"risks,":[154],"present":[156],"an":[157],"innovative":[158],"framework":[160],"enhances":[162],"protection":[164],"strengthens":[166],"resilience":[168],"infrastructure":[171],"obfuscation-based":[174],"Our":[176],"approach":[177],"validated":[179],"development":[182],"custom":[185],"image-based":[186],"dataset,":[188],"both":[190],"visual":[191],"analysis":[194],"samples,":[197],"offering":[199],"new":[201],"paradigm":[202],"research":[205],"cybersecurity":[207],"defenses.":[208]},"counts_by_year":[{"year":2026,"cited_by_count":1}],"updated_date":"2026-01-30T23:17:42.513302","created_date":"2026-01-21T00:00:00"}
