Dynamic malware analysis in the modern era—A state of the art survey

O Or-Meir, N Nissim, Y Elovici, L Rokach - ACM Computing Surveys …, 2019 - dl.acm.org
Although malicious software (malware) has been around since the early days of computers,
the sophistication and innovation of malware has increased over the years. In particular, the …

On malicious implants in PCBs throughout the supply chain

J Harrison, N Asadizanjani, M Tehranipoor - Integration, 2021 - Elsevier
The PCB supply chain has become globally distributed such that PCBs are vulnerable to
hardware Trojan attacks. Moreover, attacks on PCBs are possible even after a system is …

Review on security of internet of things authentication mechanism

T Nandy, MYIB Idris, RM Noor, LM Kiah, LS Lun… - IEEE …, 2019 - ieeexplore.ieee.org
Internet of things (IoT) is considered as a collection of heterogeneous devices, such as
sensors, Radio-frequency identification (RFID) and actuators, which form a huge network …

{USBFuzz}: A Framework for Fuzzing {USB} Drivers by Device Emulation

H Peng, M Payer - 29th USENIX Security Symposium (USENIX Security …, 2020 - usenix.org
The Universal Serial Bus (USB) connects external devices to a host. This interface exposes
the OS kernels and device drivers to attacks by malicious devices. Unfortunately, kernels …

Qualitative secondary research: A step-by-step guide

C Largan, TM Morris - 2019 - torrossa.com
This book was written in response to the rising numbers of students, who for a range of
reasons, were opting to conduct secondary research but finding it challenging to find a book …

A cyber kill chain approach for detecting advanced persistent threats

Y Ahmed, AT Asyhari… - Computers, Materials and …, 2021 - research.monash.edu
The number of cybersecurity incidents is on the rise despite significant investment in security
measures. The existing conventional security approaches have demonstrated limited …

[HTML][HTML] Fractional mathematical modeling of the Stuxnet virus along with an optimal control problem

P Kumar, V Govindaraj, VS Erturk, KS Nisar… - Ain Shams Engineering …, 2023 - Elsevier
In this digital, internet-based world, it is not new to face cyber attacks from time to time. A
number of heavy viruses have been made by hackers, and they have successfully given big …

Design of a mathematical model for the Stuxnet virus in a network of critical control infrastructure

Z Masood, R Samar, MAZ Raja - Computers & Security, 2019 - Elsevier
The purpose of this study is to develop an epidemic virus model that portrays the spread of
the Stuxnet virus in a critical control infrastructure after bridging the air-gap between a …

A survey on ethical hacking: issues and challenges

JPA Yaacoub, HN Noura, O Salman… - arXiv preprint arXiv …, 2021 - arxiv.org
Security attacks are growing in an exponential manner and their impact on existing systems
is seriously high and can lead to dangerous consequences. However, in order to reduce the …

Juice jacking: security issues and improvements in USB technology

D Singh, AK Biswal, D Samanta, D Singh, HN Lee - Sustainability, 2022 - mdpi.com
For a reliable and convenient system, it is essential to build a secure system that will be
protected from outer attacks and also serve the purpose of keeping the inner data safe from …