Results 41 to 50 of about 30,382 (272)
Using HTML5 to Prevent Detection of Drive-by-Download Web Malware [PDF]
The web is experiencing an explosive growth in the last years. New technologies are introduced at a very fast-pace with the aim of narrowing the gap between web-based applications and traditional desktop applications.
De Maio, Giancarlo +2 more
core +2 more sources
In this paper, we present three datasets that have been built from network traffic traces using ASNM (Advanced Security Network Metrics) features, designed in our previous work.
Ivan Homoliak +2 more
doaj +1 more source
Impact of Code Deobfuscation and Feature Interaction in Android Malware Detection
With more than three million applications already in the Android marketplace, various malware detection systems based on machine learning have been proposed to prevent attacks from cybercriminals; most of these systems use static analyses to extract ...
Yun-Chung Chen +4 more
doaj +1 more source
A Comprehensive Analysis of Software Obfuscation Techniques
In today's environment, a huge and increasing range of unauthorised practises allows hackers to get unauthorised access to devices and private information by inserting harmful code. The purpose of this research is to assess the efficiency of obfuscation strategies in safeguarding software against reverse engineering and tampering.
null Priyanka Kadam +2 more
openaire +1 more source
The current state of art in program obfuscations:definitions of obfuscation security
Program obfuscation is a semantic-preserving transformation aimed at bringing a program into such a form, which impedes the understanding of its algorithm and data structures or prevents extracting of some valuable information from the text of a program.
N. P. Varnovsky +3 more
doaj +1 more source
PDF-Malware Detection: A Survey and Taxonomy of Current Techniques [PDF]
Portable Document Format, more commonly known as PDF, has become, in the last 20 years, a standard for document exchange and dissemination due its portable nature and widespread adoption. The flexibility and power of this format are not only leveraged by
Aniello, L. +3 more
core +1 more source
Enhanced Obfuscation Technique for Data Confidentiality in Public Cloud Storage
With an advent of cloud computing, data storage has become a boon in information technology. At the same time, data storage in remote places have become important issues. Lot of techniques are available to ensure protection of data confidentiality. These
Oli S. Arul, Arockiam L.
doaj +1 more source
Detection of Obfuscated Malicious JavaScript Code
Websites on the Internet are becoming increasingly vulnerable to malicious JavaScript code because of its strong impact and dramatic effect. Numerous recent cyberattacks use JavaScript vulnerabilities, and in some cases employ obfuscation to conceal ...
Ammar Alazab +3 more
doaj +1 more source
Evolution and Detection of Polymorphic and Metamorphic Malwares: A Survey [PDF]
Malwares are big threat to digital world and evolving with high complexity. It can penetrate networks, steal confidential information from computers, bring down servers and can cripple infrastructures etc.
Sahay, S. K., Sharma, Ashu
core +1 more source
FPGA based remote code integrity verification of programs in distributed embedded systems [PDF]
The explosive growth of networked embedded systems has made ubiquitous and pervasive computing a reality. However, there are still a number of new challenges to its widespread adoption that include scalability, availability, and, especially, security of ...
Basile, Cataldo +2 more
core +1 more source

