This is my personal collection of research papers that I have found particularly engaging, insightful, and worth revisiting. Each paper in this repository has been selected because it either:
- Changed my perspective on malware analysis
- Solved a practical problem I encountered
- Introduced an elegant technique worth remembering
- Stood the test of time as foundational knowledge
- Spark excitement about where the field is heading
Think of this as my annotated bibliography of malware research that has shaped my understanding and practice as a security researcher.
- A personal knowledge base to return to when I need inspiration or reference
- Curated quality over quantity—only papers that earned their spot
- Filtered signal from the noise of thousands of security papers
- Context about impact that you won't find in abstracts
- Connections between papers that reveal larger trends
- Practical takeaways from someone who actually applied the research
This collection specifically targets deep technical research in:
- Static/Dynamic/Hybrid Analysis Techniques
- Reverse Engineering Methodologies
- Malware Detection & Classification (ML/AI, signature-based, behavioral)
- Unpacking, Deobfuscation & Anti-Analysis Evasion
- Memory Forensics & Live Analysis
- Threat Intelligence Extraction & Automation
- Malware Family Classification & Tracking
- Large-Scale Malware Corpus Studies
A big shout out to vx-underground for hosting most of these papers and helping advance our malware analysis journey. Their incredible archive of malware samples, research papers, and security resources has been invaluable in building this collection and deepening our understanding of the field.
Note: I respect copyright and only share papers that are open access or legally available. When possible, I will link to official sources rather than hosting PDFs directly.
This collection is provided for educational and research purposes under fair use principles. Individual papers remain the intellectual property of their respective authors and publishers. Please respect citation norms and copyright when using these resources.
"Understanding the enemy's tools is the first step in building better defenses."