A Review on malware analysis for IoT and android system

CS Yadav, S Gupta - SN Computer Science, 2022 - Springer
Today all humankind is willing to avail more facilities and hopes everything should be
available with a click of the button. In order to offer different services, the developers have …

Similarity hash based scoring of portable executable files for efficient malware detection in IoT

AP Namanya, IU Awan, JP Disso, M Younas - Future Generation Computer …, 2020 - Elsevier
The current rise in malicious attacks shows that existing security systems are bypassed by
malicious files. Similarity hashing has been adopted for sample triaging in malware analysis …

[HTML][HTML] A procedure for tracing chain of custody in digital image forensics: A paradigm based on grey hash and blockchain

M Ali, A Ismail, H Elgohary, S Darwish, S Mesbah - Symmetry, 2022 - mdpi.com
Digital evidence is critical in cybercrime investigations because it is used to connect
individuals to illegal activity. Digital evidence is complicated, diffuse, volatile, and easily …

Android Ransomware Analysis Using Convolutional Neural Network and Fuzzy Hashing Features

H Rodriguez-Bazan, G Sidorov… - IEEE …, 2023 - ieeexplore.ieee.org
Most of the time, cybercriminals look for new ways to bypass security controls by improving
their attacks. In the 1980s, attackers developed malware to kidnap user data by requesting …

Imaging and evaluating the memory access for malware

Ç Yücel, A Koltuksuz - Forensic Science International: Digital Investigation, 2020 - Elsevier
Malware analysis is a forensic process. After infection and the damage represented itself
with the full scale, then the analysis of the attack, the structure of the executable and the aim …

Improving uncertainty in chain of custody for image forensics investigation applications

HM Elgohary, SM Darwish, SM Elkaffas - IEEE Access, 2022 - ieeexplore.ieee.org
Cybercrime investigations rely heavily on digital evidence to establish links between
suspects and the criminal conduct they are allegedly involved in. As a result, digital …

LimonDroid: a system coupling three signature-based schemes for profiling Android malware

F Tchakounté, RCN Ngassi, VC Kamla… - Iran Journal of Computer …, 2021 - Springer
Android remains an interesting target to attackers due to its openness. A contribution in the
literature consists of providing similarity measurement such as fuzzy hashing to fight against …

Signature-less ransomware detection and mitigation

YS Joshi, H Mahajan, SN Joshi, KP Gupta… - Journal of Computer …, 2021 - Springer
Ransomware is a challenging threat that encrypts a user's files until some ransom is paid by
the victim. This type of malware is a profitable business for attackers, generating millions of …

Detecting and classifying self-deleting windows malware using prefetch files

A Duby, T Taylor, G Bloom… - 2022 IEEE 12th Annual …, 2022 - ieeexplore.ieee.org
Malware detection and analysis can be a burdensome task for incident responders. As such,
research has turned to machine learning to automate malware detection and malware family …

Understanding uses and misuses of similarity hashing functions for malware detection and family clustering in actual scenarios

M Botacin, VHG Moia, F Ceschin… - Forensic Science …, 2021 - Elsevier
An everyday growing number of malware variants target end-users and organizations. To
reduce the amount of individual malware handling, security analysts apply techniques for …