Asghar, Hassan Jameel https://orcid.org/0000-0001-6168-6497
Zhao, Benjamin Zi Hao
Ikram, Muhammad
Nguyen, Giang
Kaafar, Dali
Lamont, Sean
Coscia, Daniel
Funding for this research was provided by:
Defence Science and Technology Group (NGTF)
Article History
Received: 27 April 2023
Accepted: 30 August 2023
First Online: 25 September 2023
Declarations
:
: All instances of malware obfuscation detailed in this paper are in the public domain. As such, we have not introduced any malware obfuscation technique that may jeopardize the security of systems. The aim of this paper is to simply categorise them from the point of view of difficulty of detection.
: This work was partially supported by the Australian Defence Science and Technology (DST) Group under the Next Generation Technology Fund (NGTF) scheme. The datasets generated and analysed in this paper are available from the corresponding author on reasonable request.