Results 41 to 50 of about 30,382 (272)

Using HTML5 to Prevent Detection of Drive-by-Download Web Malware [PDF]

open access: yes, 2014
The web is experiencing an explosive growth in the last years. New technologies are introduced at a very fast-pace with the aim of narrowing the gap between web-based applications and traditional desktop applications.
De Maio, Giancarlo   +2 more
core   +2 more sources

ASNM Datasets: A Collection of Network Attacks for Testing of Adversarial Classifiers and Intrusion Detectors

open access: yesIEEE Access, 2020
In this paper, we present three datasets that have been built from network traffic traces using ASNM (Advanced Security Network Metrics) features, designed in our previous work.
Ivan Homoliak   +2 more
doaj   +1 more source

Impact of Code Deobfuscation and Feature Interaction in Android Malware Detection

open access: yesIEEE Access, 2021
With more than three million applications already in the Android marketplace, various malware detection systems based on machine learning have been proposed to prevent attacks from cybercriminals; most of these systems use static analyses to extract ...
Yun-Chung Chen   +4 more
doaj   +1 more source

A Comprehensive Analysis of Software Obfuscation Techniques

open access: yesInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology, 2023
In today's environment, a huge and increasing range of unauthorised practises allows hackers to get unauthorised access to devices and private information by inserting harmful code. The purpose of this research is to assess the efficiency of obfuscation strategies in safeguarding software against reverse engineering and tampering.
null Priyanka Kadam   +2 more
openaire   +1 more source

The current state of art in program obfuscations:definitions of obfuscation security

open access: yesТруды Института системного программирования РАН, 2018
Program obfuscation is a semantic-preserving transformation aimed at bringing a program into such a form, which impedes the understanding of its algorithm and data structures or prevents extracting of some valuable information from the text of a program.
N. P. Varnovsky   +3 more
doaj   +1 more source

PDF-Malware Detection: A Survey and Taxonomy of Current Techniques [PDF]

open access: yes, 2018
Portable Document Format, more commonly known as PDF, has become, in the last 20 years, a standard for document exchange and dissemination due its portable nature and widespread adoption. The flexibility and power of this format are not only leveraged by
Aniello, L.   +3 more
core   +1 more source

Enhanced Obfuscation Technique for Data Confidentiality in Public Cloud Storage

open access: yesMATEC Web of Conferences, 2016
With an advent of cloud computing, data storage has become a boon in information technology. At the same time, data storage in remote places have become important issues. Lot of techniques are available to ensure protection of data confidentiality. These
Oli S. Arul, Arockiam L.
doaj   +1 more source

Detection of Obfuscated Malicious JavaScript Code

open access: yesFuture Internet, 2022
Websites on the Internet are becoming increasingly vulnerable to malicious JavaScript code because of its strong impact and dramatic effect. Numerous recent cyberattacks use JavaScript vulnerabilities, and in some cases employ obfuscation to conceal ...
Ammar Alazab   +3 more
doaj   +1 more source

Evolution and Detection of Polymorphic and Metamorphic Malwares: A Survey [PDF]

open access: yes, 2015
Malwares are big threat to digital world and evolving with high complexity. It can penetrate networks, steal confidential information from computers, bring down servers and can cripple infrastructures etc.
Sahay, S. K., Sharma, Ashu
core   +1 more source

FPGA based remote code integrity verification of programs in distributed embedded systems [PDF]

open access: yes, 2012
The explosive growth of networked embedded systems has made ubiquitous and pervasive computing a reality. However, there are still a number of new challenges to its widespread adoption that include scalability, availability, and, especially, security of ...
Basile, Cataldo   +2 more
core   +1 more source

Home - About - Disclaimer - Privacy