Zobrazeno 1 - 10
of 59
pro vyhledávání: '"evasion techniques"'
Autor:
Guangquan Xu, Wenyu Dong, Jun Xing, Wenqing Lei, Jian Liu, Lixiao Gong, Meiqi Feng, Xi Zheng, Shaoying Liu
Publikováno v:
Digital Communications and Networks, Vol 9, Iss 5, Pp 1169-1179 (2023)
Cryptojacking is a type of resource embezzlement attack, wherein an attacker secretly executes the cryptocurrency mining program in the target host to gain profits. It has been common since 2017, and in fact, it once became the greatest threat to net
Externí odkaz:
https://doaj.org/article/002db416d88442ada31c12a5c7e30482
Publikováno v:
IEEE Access, Vol 11, Pp 71925-71939 (2023)
Phishing represents a cybersecurity attack strategy commonly employed by cybercriminals to unlawfully acquire sensitive user information, including passwords, account details, credit card data, and other personally identifiable information. Phishing
Externí odkaz:
https://doaj.org/article/84042c4ae23d421fae93eafe7b414d1c
Autor:
Faitouri A. Aboaoja, Anazida Zainal, Fuad A. Ghaleb, Norah Saleh Alghamdi, Faisal Saeed, Husayn Alhuwayji
Publikováno v:
PeerJ Computer Science, Vol 9, p e1492 (2023)
Background Malware, malicious software, is the major security concern of the digital realm. Conventional cyber-security solutions are challenged by sophisticated malicious behaviors. Currently, an overlap between malicious and legitimate behaviors ca
Externí odkaz:
https://doaj.org/article/acc9b29df54446a9824f60c5fd8b7e5c
Publikováno v:
Information, Vol 14, Iss 7, p 374 (2023)
Android platform security is an active area of research where malware detection techniques continuously evolve to identify novel malware and improve the timely and accurate detection of existing malware. Adversaries are constantly in charge of employ
Externí odkaz:
https://doaj.org/article/314f0b9bad4343e8a292fb9f0f44016d
Publikováno v:
IEEE Access, Vol 8, Pp 199638-199645 (2020)
Recently, intelligent Android malware avoids being analyzed using anti-emulator, anti-debugging, and rooting detection. Existing emulators have problems to be easily detected by malware that check with hardware or sensor information. This paper propo
Externí odkaz:
https://doaj.org/article/18a35cd74a9243ad86ad6b9bbe8335b8
Publikováno v:
PeerJ Computer Science, Vol 8, p e907 (2022)
The various application markets are facing an exponential growth of Android malware. Every day, thousands of new Android malware applications emerge. Android malware hackers adopt reverse engineering and repackage benign applications with their malic
Externí odkaz:
https://doaj.org/article/f778530bb82549eaac65ca9f1e517c56
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Autor:
A. Al-Marghilani
Publikováno v:
Engineering, Technology & Applied Science Research, Vol 11, Iss 4 (2021)
Malware detection in Internet of Things (IoT) devices is a great challenge, as these devices lack certain characteristics such as homogeneity and security. Malware is malicious software that affects a system as it can steal sensitive information, slo
Autor:
Manuel Sánchez Rubio, Theofilos Toulkeridis, Walter Fuertes, Mauro Callejas Cuervo, Álvaro Arribas Royo, Carlos Andrés Estrada
Publikováno v:
Advances in Intelligent Systems and Computing ISBN: 9783030726560
WorldCIST (1)
Re-Unir. Archivo Institucional de la Universidad Internacional de La Rioja
instname
WorldCIST (1)
Re-Unir. Archivo Institucional de la Universidad Internacional de La Rioja
instname
The current study evaluates the malware life cycle and develops a keylogger that can avoid Windows 10 security systems. Therefore, we considered the requirements of the malware in order to create a keylogger. Afterward, we developed a customized and
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::e083b9a503644207cd398a2eeaba2e17
https://doi.org/10.1007/978-3-030-72657-7_36
https://doi.org/10.1007/978-3-030-72657-7_36