A comprehensive survey of advanced persistent threat attribution: Taxonomy, methods, challenges and open research problems

N Rani, B Saha, SK Shukla - arXiv preprint arXiv:2409.11415, 2024 - arxiv.org
Advanced Persistent Threat (APT) attribution is a critical challenge in cybersecurity and
implies the process of accurately identifying the perpetrators behind sophisticated cyber …

Identifying Authorship in Malicious Binaries: Features, Challenges & Datasets

J Gray, D Sgandurra, L Cavallaro… - ACM Computing …, 2024 - dl.acm.org
Attributing a piece of malware to its creator typically requires threat intelligence. Binary
attribution increases the level of difficulty as it mostly relies upon the ability to disassemble …

SepBIN: Binary Feature Separation for Better Semantic Comparison and Authorship Verification

Q Song, Y Sang, Y Zhang, S Li… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Binary semantic comparison and authorship verification are critical in many security
applications. They respectively focus on the functional semantic features and developers' …

Nation-state threat actor attribution using fuzzy hashing

M Kida, O Olukoya - IEEE Access, 2022 - ieeexplore.ieee.org
Recent years have seen a rise in state-sponsored malware. Advanced Persistent Threat
groups (APTs) have been waging a covert war with little repercussions due to the …

[PDF][PDF] MAIT: Malware Analysis and Intelligence Tool

C Yucel, A Lockett, I Chalkias, D Mallis, V Katos - Information & Security, 2021 - procon.bg
Malware is the instrument that delivers the decisive blow in cyber-attacks. A first-time
presented malware or an updated malware can remain undetected and stealth until the …

[PDF][PDF] Attribution of Malware Binaries to APT Actors using an Ensemble Classifier

M Benthin - 2022 - researchgate.net
Abstract Malware Authorship Attribution is one of the most sophisticated task performed by
threat analysts, looking for similarities between malicious programs developed by the same …

Usefulness of Cyber Attribution Indicators

H Karlzén - ECCWS 2020 19th European Conference on Cyber …, 2020 - books.google.com
Attributing a cyberattack to the attacker is difficult. Cyberspace is conducive to anonymity
and many attackers actively hide their tracks by using false flags that point to other culprits …

[PDF][PDF] Detecting Capabilities in Malware Binaries by Searching for Function Calls

J Vrancken, E Poll, F Verbeek - 2022 - cs.ru.nl
Incidents like the ransomware attack on the Colonial Pipeline in 2021 [37] show that
malware is a growing threat with real-world implications. To combat this growing threat …

[PDF][PDF] Attributing Malware Binaries to Threat Actors based on Authorship Style

M Benthin - 2022 - researchgate.net
It is increasingly important to determine the threat actors behind an attack to tackle the
growing number of sophisticated cyber-attacks on public authorities and critical …

[PDF][PDF] Automated Malware Attribution

B Hofman, E Poll, A Serban - 2021 - cs.ru.nl
The classification (attribution or detection) of malware binaries has an urgent need to be
automated. Due to the increase in the amount of malware and the sophistication of this …