Results 181 to 190 of about 6,970 (211)
Some of the next articles are maybe not open access.

Malware Analysis

Proceedings of the Second International Conference on Information and Communication Technology for Competitive Strategies, 2016
Malicious code is a serious issue which regularly threatens the security of computer systems and act as a challenging task for cyber security& Information security personals. Malicious code is named differently according to their specification such as virus, worm, Trojan, Rootkit, spam etc.
Rakesh Singh Kunwar, Priyanka Sharma
openaire   +1 more source

IoT Malware Analysis

2019 IEEE 43rd Annual Computer Software and Applications Conference (COMPSAC), 2019
IoT devices can be used to fulfil many of our daily tasks. IoT could be wearable devices, home appliances, or even light bulbs. With the introduction of this new technology, however, vulnerabilities are being introduced and can be leveraged or exploited by malicious users. One common vehicle of exploitation is malicious software, or malware.
Victor Clincy, Hossain Shahriar
openaire   +1 more source

Malware behaviour analysis

Journal in Computer Virology, 2007
Several malware analysis techniques suppose that the disassembled code of a piece of malware is available, which is however not always possible. This paper proposes a flexible and automated approach to extract malware behaviour by observing all the system function calls performed in a virtualized execution environment.
GĂ©rard Wagener   +2 more
openaire   +1 more source

Malware Automatic Analysis

2013 BRICS Congress on Computational Intelligence and 11th Brazilian Congress on Computational Intelligence, 2013
The malicious code analysis allows malware behavior characteristics to be identified, in other words how does it act in the operating system, what obfuscation techniques are used, which execution flows lead to the primary planned behavior, use of network operations, files downloading operations, user and system's information capture, access to records,
Cesar Augusto Borges de Andrade   +2 more
openaire   +1 more source

WannaCry Malware Analysis

MERI-Journal of Management & IT, 2017
In business scenarios today, the most precious asset is computer systems and the data which is stored in them. Attackers are well aware of this fact and that is the reason why they can easily make money by holding this data at ransom. This is the reason why ransomware form of malware is on constant rise and is threatening businesses.
Navneet Kaur Popli, Anup Girdhar
openaire   +1 more source

Malware Analysis and Classification

2023
Malicious applications can be a security threat to Cyber-physical systems as these systems are composed of heterogeneous distributed systems and mostly depends on the internet, ICT services and products. The usage of ICT products and services gives the opportunity of less expensive data collection, intelligent control and decision systems using ...
Jairaj Singh   +1 more
openaire   +1 more source

Analysis of Malware

2020
Many APT groups are best known for their professionally developed malware. Sure enough, backdoors and trojans play a central role in attacks. But they also contain a wealth of information that is useful for attribution. Therefore, this chapter looks at how malware is developed and employed, and how analysts find clues about the perpetrators.
openaire   +1 more source

Analysis-Resistant Malware

2018
Traditionally, techniques for computing on encrypted data have been proposed with privacy preserving applications in mind. Several current cryptosystems support a homomorphic operation, allowing simple computations to be performed using encrypted values. This is sufficient to realize several useful applications, including schemes for electronic voting [
Bethencourt, John   +2 more
openaire   +1 more source

Android malware analysis and conceptual malware mitigation approaches

2016 International Conference on Information and Communication Technology Convergence (ICTC), 2016
Mobile devices have enjoyed unprecedented growth in the last decade. As devices become more ubiquitous and users place more sensitive data on their devices, the amount of mobile malware in the wild has grown. In order to protect mobile device users and their data, mobile security solutions have been brought to market for consumer and enterprise users ...
Tae Oh   +4 more
openaire   +1 more source

PDF Malware Analysis

2022 7th International Conference on Computing, Communication and Security (ICCCS), 2022
Md Yusuf Khalil   +4 more
openaire   +1 more source

Home - About - Disclaimer - Privacy