A comprehensive analysis combining structural features for detection of new ransomware families

CC Moreira, DC Moreira, C Sales Jr - Journal of Information Security and …, 2024 - Elsevier
This study presents a comprehensive static analysis method that combines multiple
structural features extracted from Windows executable files. The method employs an …

Enabling Obfuscation Detection in Binary Software through eXplainable AI

C Greco, M Ianni, A Guzzo… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Binary obfuscation techniques are commonly employed to protect code against reverse
engineering and piracy. Unfortunately, besides being used for legitimate purposes, virus …

SigIL: A Signature-Based Approach of Malware Detection on Intermediate Language

G Fortino, C Greco, A Guzzo, M Ianni - European Symposium on Research …, 2023 - Springer
Abstract The Internet of Things (IoT) has brought about significant advancements in
connectivity but has also introduced security challenges due to the diverse range of IoT …

[PDF][PDF] Data/Process Analysis for Advanced Interoperable Cyber Ranges

G Salerno - 2024 - sebd2024.unica.it
Cyber Ranges (CR) are strategic assets for cyber security that can be used by a wide range
of users and for many purposes including cybersecurity education, testing, and research …