{"id":"https://openalex.org/W4296272594","doi":"https://doi.org/10.3233/faia220249","title":"Anti-Obfuscation Techniques: Recent Analysis of Malware Detection","display_name":"Anti-Obfuscation Techniques: Recent Analysis of Malware Detection","publication_year":2022,"publication_date":"2022-09-14","ids":{"openalex":"https://openalex.org/W4296272594","doi":"https://doi.org/10.3233/faia220249"},"language":"en","primary_location":{"id":"doi:10.3233/faia220249","is_oa":false,"landing_page_url":"https://doi.org/10.3233/faia220249","pdf_url":null,"source":{"id":"https://openalex.org/S4210201731","display_name":"Frontiers in artificial intelligence and applications","issn_l":"0922-6389","issn":["0922-6389","1879-8314"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Frontiers in Artificial Intelligence and Applications","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5017634431","display_name":"Nor Zakiah Gorment","orcid":"https://orcid.org/0000-0001-5596-6599"},"institutions":[{"id":"https://openalex.org/I4576418","display_name":"University of Technology Malaysia","ror":"https://ror.org/026w31v75","country_code":"MY","type":"education","lineage":["https://openalex.org/I4576418"]},{"id":"https://openalex.org/I79156528","display_name":"Universiti Tenaga Nasional","ror":"https://ror.org/03kxdn807","country_code":"MY","type":"education","lineage":["https://openalex.org/I79156528","https://openalex.org/I874769580"]}],"countries":["MY"],"is_corresponding":true,"raw_author_name":"Nor Zakiah Gorment","raw_affiliation_strings":["College of Computing and Informatics, Universiti Tenaga Nasional, Jalan IKRAM-UNITEN, 43000 Kajang, Selangor, Malaysia","Malaysia-Japan International Institute of Technology, Universiti Teknologi Malaysia, Jalan Sultan Yahya Petra, 54100 Kuala Lumpur, Malaysia"],"raw_orcid":"https://orcid.org/0000-0001-5596-6599","affiliations":[{"raw_affiliation_string":"College of Computing and Informatics, Universiti Tenaga Nasional, Jalan IKRAM-UNITEN, 43000 Kajang, Selangor, Malaysia","institution_ids":["https://openalex.org/I79156528"]},{"raw_affiliation_string":"Malaysia-Japan International Institute of Technology, Universiti Teknologi Malaysia, Jalan Sultan Yahya Petra, 54100 Kuala Lumpur, Malaysia","institution_ids":["https://openalex.org/I4576418"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5089742876","display_name":"Ali Selamat","orcid":"https://orcid.org/0000-0001-9746-8459"},"institutions":[{"id":"https://openalex.org/I4576418","display_name":"University of Technology Malaysia","ror":"https://ror.org/026w31v75","country_code":"MY","type":"education","lineage":["https://openalex.org/I4576418"]},{"id":"https://openalex.org/I75092371","display_name":"University of Hradec Kr\u00e1lov\u00e9","ror":"https://ror.org/05k238v14","country_code":"CZ","type":"education","lineage":["https://openalex.org/I75092371"]}],"countries":["CZ","MY"],"is_corresponding":false,"raw_author_name":"Ali Selamat","raw_affiliation_strings":["Center for Basic and Applied Research, Faculty of Informatics and Management, University of Hradec Kralove, Rokitanskeho 62, Hradec Kralove 50003, Czech Republic","Malaysia-Japan International Institute of Technology, Universiti Teknologi Malaysia, Jalan Sultan Yahya Petra, 54100 Kuala Lumpur, Malaysia","Media and Games Center of Excellence (MagicX), Universiti Teknologi Malaysia, Skudai 81310, Johor Bahru, Malaysia","School of Computing, Faculty of Engineering, Universiti Teknologi Malaysia, Skudai 81310, Johor Bahru, Johor, Malaysia"],"raw_orcid":"https://orcid.org/0000-0001-9746-8459","affiliations":[{"raw_affiliation_string":"Center for Basic and Applied Research, Faculty of Informatics and Management, University of Hradec Kralove, Rokitanskeho 62, Hradec Kralove 50003, Czech Republic","institution_ids":["https://openalex.org/I75092371"]},{"raw_affiliation_string":"Malaysia-Japan International Institute of Technology, Universiti Teknologi Malaysia, Jalan Sultan Yahya Petra, 54100 Kuala Lumpur, Malaysia","institution_ids":["https://openalex.org/I4576418"]},{"raw_affiliation_string":"Media and Games Center of Excellence (MagicX), Universiti Teknologi Malaysia, Skudai 81310, Johor Bahru, Malaysia","institution_ids":["https://openalex.org/I4576418"]},{"raw_affiliation_string":"School of Computing, Faculty of Engineering, Universiti Teknologi Malaysia, Skudai 81310, Johor Bahru, Johor, Malaysia","institution_ids":["https://openalex.org/I4576418"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5045569977","display_name":"Ond\u0159ej Krejcar","orcid":"https://orcid.org/0000-0002-5992-2574"},"institutions":[{"id":"https://openalex.org/I4576418","display_name":"University of Technology Malaysia","ror":"https://ror.org/026w31v75","country_code":"MY","type":"education","lineage":["https://openalex.org/I4576418"]},{"id":"https://openalex.org/I75092371","display_name":"University of Hradec Kr\u00e1lov\u00e9","ror":"https://ror.org/05k238v14","country_code":"CZ","type":"education","lineage":["https://openalex.org/I75092371"]}],"countries":["CZ","MY"],"is_corresponding":false,"raw_author_name":"Ondrej Krejcar","raw_affiliation_strings":["Center for Basic and Applied Research, Faculty of Informatics and Management, University of Hradec Kralove, Rokitanskeho 62, Hradec Kralove 50003, Czech Republic","Malaysia-Japan International Institute of Technology, Universiti Teknologi Malaysia, Jalan Sultan Yahya Petra, 54100 Kuala Lumpur, Malaysia"],"raw_orcid":"https://orcid.org/0000-0002-5992-2574","affiliations":[{"raw_affiliation_string":"Center for Basic and Applied Research, Faculty of Informatics and Management, University of Hradec Kralove, Rokitanskeho 62, Hradec Kralove 50003, Czech Republic","institution_ids":["https://openalex.org/I75092371"]},{"raw_affiliation_string":"Malaysia-Japan International Institute of Technology, Universiti Teknologi Malaysia, Jalan Sultan Yahya Petra, 54100 Kuala Lumpur, Malaysia","institution_ids":["https://openalex.org/I4576418"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5017634431"],"corresponding_institution_ids":["https://openalex.org/I4576418","https://openalex.org/I79156528"],"apc_list":null,"apc_paid":null,"fwci":2.0191,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.88529718,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":97},"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9941999912261963,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9922000169754028,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/obfuscation","display_name":"Obfuscation","score":0.9720616340637207},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.9624921083450317},{"id":"https://openalex.org/keywords/cryptovirology","display_name":"Cryptovirology","score":0.8205046653747559},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7776719331741333},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6371039748191833},{"id":"https://openalex.org/keywords/malware-analysis","display_name":"Malware analysis","score":0.5360828638076782}],"concepts":[{"id":"https://openalex.org/C40305131","wikidata":"https://www.wikidata.org/wiki/Q2616305","display_name":"Obfuscation","level":2,"score":0.9720616340637207},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.9624921083450317},{"id":"https://openalex.org/C84525096","wikidata":"https://www.wikidata.org/wiki/Q3506050","display_name":"Cryptovirology","level":3,"score":0.8205046653747559},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7776719331741333},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6371039748191833},{"id":"https://openalex.org/C2779395397","wikidata":"https://www.wikidata.org/wiki/Q15731404","display_name":"Malware analysis","level":3,"score":0.5360828638076782}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.3233/faia220249","is_oa":false,"landing_page_url":"https://doi.org/10.3233/faia220249","pdf_url":null,"source":{"id":"https://openalex.org/S4210201731","display_name":"Frontiers in artificial intelligence and applications","issn_l":"0922-6389","issn":["0922-6389","1879-8314"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Frontiers in Artificial Intelligence and Applications","raw_type":"book-chapter"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.6000000238418579,"id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W2900526031","https://openalex.org/W2470502009","https://openalex.org/W170652726","https://openalex.org/W109909280","https://openalex.org/W2591653665","https://openalex.org/W4249009605","https://openalex.org/W2899560833","https://openalex.org/W2125235075","https://openalex.org/W2919574310","https://openalex.org/W2614215062"],"abstract_inverted_index":{"One":[0],"of":[1,56,83,93,97],"the":[2,7,46,51,54,94,105,112],"challenging":[3],"issues":[4,114],"in":[5],"detecting":[6],"malware":[8,13,34,67,87,98,126],"is":[9,77],"that":[10,115],"modern":[11,42],"stealthy":[12],"prefers":[14],"to":[15,40,62,71,79,110],"stay":[16],"hidden":[17],"during":[18],"their":[19],"attacks":[20],"on":[21],"our":[22],"devices":[23],"and":[24,37,64,104,120],"be":[25],"obfuscated.":[26],"They":[27],"can":[28],"evade":[29],"antivirus":[30],"scanners":[31],"or":[32,49],"other":[33],"analysis":[35,82,92],"tools":[36],"might":[38,116],"attempt":[39],"thwart":[41],"detection,":[43],"including":[44],"altering":[45],"file":[47],"attributes":[48],"performing":[50],"action":[52],"under":[53],"pretense":[55],"authorized":[57],"services.":[58],"Therefore,":[59],"it\u2019s":[60],"crucial":[61],"understand":[63],"analyze":[65],"how":[66],"implements":[68],"obfuscation":[69,106],"techniques":[70,85,107],"curb":[72],"these":[73],"concerns.":[74],"This":[75],"paper":[76],"dedicated":[78],"presenting":[80],"an":[81,90,122],"anti-obfuscation":[84],"for":[86,125],"detection.":[88,127],"Furthermore,":[89],"empirical":[91],"performance":[95],"evaluation":[96],"detection":[99],"using":[100],"machine":[101],"learning":[102],"algorithms":[103],"was":[108],"conducted":[109],"address":[111],"associated":[113],"help":[117],"researchers":[118],"plan":[119],"generate":[121],"efficient":[123],"algorithm":[124]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
