An ontology-driven framework for knowledge representation of digital extortion attacks

M Keshavarzi, HR Ghaffary - Computers in Human Behavior, 2023 - Elsevier
With the COVID-19 pandemic and the growing influence of the Internet in critical sectors of
industry and society, cyberattacks have not only not declined, but have risen sharply. In the …

A Survey of strategy-driven evasion methods for PE malware: transformation, concealment, and attack

J Geng, J Wang, Z Fang, Y Zhou, D Wu, W Ge - Computers & Security, 2024 - Elsevier
The continuous proliferation of malware poses a formidable threat to the cyberspace
landscape. Researchers have proffered a multitude of sophisticated defense mechanisms …

HEAVEN: A Hardware-Enhanced AntiVirus ENgine to accelerate real-time, signature-based malware detection

M Botacin, MZ Alves, D Oliveira, A Grégio - Expert Systems with …, 2022 - Elsevier
Antiviruses (AVs) are computing-intensive applications that rely on constant monitoring of
OS events and on applying pattern matching procedures on binaries to detect malware. In …

Yamme: a yara-byte-signatures metamorphic mutation engine

A Coscia, V Dentamaro, S Galantucci… - IEEE Transactions …, 2023 - ieeexplore.ieee.org
Recognition of known malicious patterns through signature-based systems is unsuccessful
against malware for which no known signature exists to identify them. These include not only …

A game-theoretic approach to containing artificial general intelligence: Insights from highly autonomous aggressive malware

TR McIntosh, T Susnjak, T Liu, P Watters… - IEEE Transactions …, 2024 - ieeexplore.ieee.org
Artificial General Intelligence (AGI) promises transformative societal changes but poses
safety and containment challenges. Large Language Models like ChatGPT have intensified …

[HTML][HTML] WebAssembly diversification for malware evasion

J Cabrera-Arteaga, M Monperrus, T Toady… - Computers & Security, 2023 - Elsevier
WebAssembly has become a crucial part of the modern web, offering a faster alternative to
JavaScript in browsers. While boosting rich applications in browser, this technology is also …

CMD: co-analyzed iot malware detection and forensics via network and hardware domains

Z Zhao, Z Li, J Yu, F Zhang, X Xie… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
With the widespread use of Internet of Things (IoT) devices, malware detection has become
a hot spot for both academic and industrial communities. Existing approaches can be …

Machine learning (in) security: A stream of problems

F Ceschin, M Botacin, A Bifet, B Pfahringer… - … Threats: Research and …, 2024 - dl.acm.org
Machine Learning (ML) has been widely applied to cybersecurity and is considered state-of-
the-art for solving many of the open issues in that field. However, it is very difficult to evaluate …

Microsoft Defender Will Be Defended: MemoryRanger Prevents Blinding Windows AV

D Pogonin, I Korkin - arXiv preprint arXiv:2210.02821, 2022 - arxiv.org
Windows OS is facing a huge rise in kernel attacks. An overview of popular techniques that
result in loading kernel drivers will be presented. One of the key targets of modern threats is …

Uma Estratégia Dinâmica para a Detecção de Anomalias em Binários WebAssembly

C Helpa, T Heinrich, M Botacin, NC Will… - Simpósio Brasileiro de …, 2023 - sol.sbc.org.br
WebAssembly é um formato binário de baixo nível, que oferece um alvo de compilação para
linguagens de alto nível. Oferecendo mais segurança para os usuários na Web, com um …