@misc{Jamgharyan_Timur_V._Оbfuscated, author={Jamgharyan, Timur V. and Iskandaryan, Vaghashak S. and Khemchyan, Artak A.}, howpublished={online}, publisher={Изд-во НАН РА}, abstract={The paper presents the research results on the detection of obfuscated malware using a method based on mean shift. The research aimed to train neural networks included in the intrusion detection system to detect obfuscated malware. Detection of obfuscated malware using deterministic obfuscators is also discussed. Software solutions Dotfuscator CE, Net Reactor, and Pro Guardwere used as deterministic obfuscators. Athena, abc, cheeba, dyre, december_3, engrat, surtr, stasi, otario, dm, v-sign, tequila, flip, grum, mimikatz were used as test malware. The results were verified using the IDA Pro tool and various intrusion detection systems. Process modeling was carried out in the Hyper-V virtual environment.}, type={Հոդված}, title={Оbfuscated Мalware Detection Model}, keywords={Reverse engineering}, }