Results 21 to 30 of about 19,937 (276)
Evaluation of Local Security Event Management System vs. Standard Antivirus Software
The detection and classification of threats in computer systems has been one of the main problems researched in Cybersecurity. As technology evolves, the tactics employed by adversaries have also become more sophisticated to evade detection systems.
Antonio Pérez-Sánchez, Rafael Palacios
doaj +1 more source
PDF-Malware Detection: A Survey and Taxonomy of Current Techniques [PDF]
Portable Document Format, more commonly known as PDF, has become, in the last 20 years, a standard for document exchange and dissemination due its portable nature and widespread adoption. The flexibility and power of this format are not only leveraged by
Aniello, L. +3 more
core +1 more source
Obfuscation-based malware update: A comparison of manual and automated methods [PDF]
Indexación: Scopus; Web of Science.This research presents a proposal of malware classification and its update based on capacity and obfuscation. This article is an extension of [4]a, and describes the procedure for malware updating, that is, to take ...
Barría, C. +4 more
core +2 more sources
Hybrid Obfuscation Using Signals and Encryption
Obfuscation of software and data is one of the subcategories of software security. Hence, the outlines of the obfuscation problem and its various methods have been studied in this article.
Bahare Hashemzade, Ali Maroosi
doaj +1 more source
Dynamic analysis of virtualization- and dispatching-obfuscated applications
Obfuscation algorithms are now widely used to prevent software reverse engineering. Binary code virtualization is one of the most powerful obfuscations technics.
M. G. Bakulin +5 more
doaj +1 more source
VCF: Virtual Code Folding to Enhance Virtualization Obfuscation
Code virtualization, also called virtualization obfuscation, is a code obfuscation technique that protects software from malicious analysis. Unlike code packing or code encryption techniques, code virtualization does not restore the original code on the ...
Jae Hyuk Suk, Dong Hoon Lee
doaj +1 more source
Achieving Obfuscation Through Self-Modifying Code: A Theoretical Model [PDF]
With the extreme amount of data and software available on networks, the protection of online information is one of the most important tasks of this technological age.
Waddell, Heidi
core +1 more source
An introduction to software obfuscation. [PDF]
Obfuscation protects software by making the code more difficult to understand. We review a collection of obfuscation techniques. We then consider what would constitute a theory of obfuscation. Several possibilities that could lead to such a theory are explored.
openaire +2 more sources
FPGA based remote code integrity verification of programs in distributed embedded systems [PDF]
The explosive growth of networked embedded systems has made ubiquitous and pervasive computing a reality. However, there are still a number of new challenges to its widespread adoption that include scalability, availability, and, especially, security of ...
Basile, Cataldo +2 more
core +1 more source
Using HTML5 to Prevent Detection of Drive-by-Download Web Malware [PDF]
The web is experiencing an explosive growth in the last years. New technologies are introduced at a very fast-pace with the aim of narrowing the gap between web-based applications and traditional desktop applications.
De Maio, Giancarlo +2 more
core +2 more sources

