Zobrazeno 1 - 10
of 167
pro vyhledávání: '"Cyber-collection"'
Publikováno v:
DocEng
We present an overview of the field of malware analysis with emphasis on issues related to document engineering. We will introduce the field with a discussion of the types of malware, including executable binaries, malicious PDFs, polymorphic malware
Publikováno v:
Computers & Security. 77:756-772
Banking malware are a class of information stealing malicious software that target the financial industry. Banking malware families have become persistent with new versions being released by the original authors or by others using leaked source code.
Publikováno v:
Journal of Network and Computer Applications. 103:249-261
The widespread adoption of Internet of Things (IoT) in industrial systems has made malware propagation more voluminous and sophisticated. Detection and prevention against these malware threats rely on automated dynamic analysis techniques. Malware wr
Publikováno v:
Repositório Institucional da USP (Biblioteca Digital da Produção Intelectual)
Universidade de São Paulo (USP)
instacron:USP
Universidade de São Paulo (USP)
instacron:USP
Malware analysis systems are essential to characterize malware behavior and to improve defense mechanisms. In dynamic malware analysis, the actions performed by malware in a sandbox are highly dependent on the interactions with other hosts and servic
Publikováno v:
American Journal of Applied Sciences. 14:1049-1069
Malicious programs are malignant software’s designed by hackers or cyber offenders with a harmful intent to disrupt computer operation. In various researches, we found that the balance between designing an accurate architecture that can detect the
Publikováno v:
ACM Computing Surveys. 50:1-40
In the Internet age, malware (such as viruses, trojans, ransomware, and bots) has posed serious and evolving security threats to Internet users. To protect legitimate users from these threats, anti-malware software products from different companies,
Publikováno v:
Journal of Computer Virology and Hacking Techniques. 14:87-98
In order to thwart dynamic analysis and bypass protection mechanisms, malware have been using several file formats and evasive techniques. While publicly available dynamic malware analysis systems are one of the main sources of information for resear
Publikováno v:
Tam, K, Feizollah, A, Anuar, N B, Salleh, R & Cavallaro, L 2017, ' The Evolution of Android Malware and Android Analysis Techniques ', COMPUTING SURVEYS, vol. 49, no. 4, pp. 1-41 . https://doi.org/10.1145/3017427
With the integration of mobile devices into daily life, smartphones are privy to increasing amounts of sensitive information. Sophisticated mobile malware, particularly Android malware, acquire or utilize such data without user consent. It is therefo
Publikováno v:
Cybernetics and Systems. 48:29-48
Academicians and industrialists working on malware use static and dynamic analysis in order to understand their functionality and the menace level posed by them. Industries providing anti-malware solutions calculate malware threat level using the app
Autor:
Şerif Bahtiyar
Publikováno v:
Security and Communication Networks. 9:6215-6226
The expansive connectivity of information systems has set the stage for pervasive malware to leverage multiple attack vectors and propagation methods. In doing so, this malware has taken on the complexity and richness of the very society it endeavors