Results 1 to 10 of about 6,970 (211)
Android malware analysis in a nutshell. [PDF]
This paper offers a comprehensive analysis model for android malware. The model presents the essential factors affecting the analysis results of android malware that are vision-based.
Iman Almomani +2 more
doaj +2 more sources
A hybrid machine learning approach for analysis of stegomalware [PDF]
Purpose – Given how smart today’s malware authors have become through employing highly sophisticated techniques, it is only logical that methods be developed to combat the most potent threats, particularly where the malware is stealthy and makes ...
Prudence Kadebu +6 more
doaj +1 more source
Malware has plagued the internet and computing systems for decades. The war against malware has always been an arms race. Researchers and industry have constantly improved detection and prevention methodologies against increasingly more evasive malware ...
Siwon Huh +4 more
doaj +1 more source
Large-Scale Analysis on Anti-Analysis Techniques in Real-World Malware
To dynamically identify malicious behaviors of millions of Windows malware, anti-virus vendors have widely been using sandbox-based analyzers. However, the sandbox-based analysis has a critical limitation that anti-analysis techniques (i.e., Anti-sandbox
Minho Kim, Haehyun Cho, Jeong Hyun Yi
doaj +1 more source
FAM: Featuring Android Malware for Deep Learning-Based Familial Analysis
To handle relentlessly emerging Android malware, deep learning has been widely adopted in the research community. Prior work proposed deep learning-based approaches that use different features of malware, and reported a high accuracy in malware detection,
Younghoon Ban +4 more
doaj +1 more source
A Hybrid Approach for Android Malware Detection and Family Classification
With the increase in the popularity of mobile devices, malicious applications targeting Android platform have greatly increased. Malware is coded so prudently that it has become very complicated to identify.
Meghna Dhalaria, Ekta Gandotra
doaj +1 more source
Binary and Multi-Class Malware Threads Classification
The security of a computer system can be harmed by specific applications, such as malware. Malware comprises unwanted, dangerous enemies that aim to compromise the security and generate significant loss.
Ismail Taha Ahmed +3 more
doaj +1 more source
Android Malware Category and Family Identification Using Parallel Machine Learning [PDF]
Android malware is one of the most dangerous threats on the Internet. It has been on the rise for several years. As a result, it has impacted many applications such as healthcare, banking, transportation, government, e-commerce, etc.
Ahmed Hashem El Fiky +2 more
doaj +1 more source
This slide deck lays out the differences between static and dynamic malware analysis methods. Relevant and valuable tools such as IDA Pro, PE Explorer, OllyDBG, WinDBG, and Procmon are covered in depth. For each tool there is an overview, a detailed description of the key features, and then a brief overview of other relevant features.
Nikita Patil +2 more
openaire +2 more sources
Analysis of Mobile Malware: A Systematic Review of Evolution and Infection Strategies
The open-source and popularity of Android attracts hackers and has multiplied security concerns targeting devices. As such, malware attacks on Android are one of the security challenges facing society.
Ashawa Moses, Sarah Morris
doaj +1 more source

