Classification and analysis of malicious code detection techniques based on the APT attack

K Lee, J Lee, K Yim - Applied Sciences, 2023 - mdpi.com
According to the Fire-eye's M-Trends Annual Threat Report 2022, there are many advanced
persistent threat (APT) attacks that are currently in use, and such continuous and specialized …

Vehicle security: A survey of security issues and vulnerabilities, malware attacks and defenses

AA Elkhail, RUD Refat, R Habre, A Hafeez… - IEEE …, 2021 - ieeexplore.ieee.org
Recent years have led the path to the evolution of automotive technology and with these
new developments, modern vehicles are getting increasingly astute and offering growing …

Employing program semantics for malware detection

S Naval, V Laxmi, M Rajarajan… - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
In recent years, malware has emerged as a critical security threat. In addition, malware
authors continue to embed numerous anti-detection features to evade the existing malware …

[HTML][HTML] Getting to the root of the problem: A detailed comparison of kernel and user level data for dynamic malware analysis

M Nunes, P Burnap, O Rana, P Reinecke… - Journal of Information …, 2019 - Elsevier
Dynamic malware analysis is fast gaining popularity over static analysis since it is not easily
defeated by evasion tactics such as obfuscation and polymorphism. During dynamic …

Lab to soc: robust features for dynamic malware detection

M Rhode, L Tuson, P Burnap… - 2019 49th annual IEEE …, 2019 - ieeexplore.ieee.org
Machine learning models regularly achieve more than 95% accuracy in academic literature
for dynamic malware detection problems, but the samples providing the data for these …

Secure random encryption for deduplicated storage

J Dave, S Saharan, P Faruki, V Laxmi… - … Systems Security: 13th …, 2017 - Springer
Abstract In Storage Services, Deduplication is used to reduce the data size by eliminating
storage of duplicate data. Deduplication is an effective data reduction technique to minimize …

MalFe—malware feature engineering generation platform

A Singh, RA Ikuesan, H Venter - Computers, 2023 - mdpi.com
The growing sophistication of malware has resulted in diverse challenges, especially among
security researchers who are expected to develop mechanisms to thwart these malicious …

Secure and efficient proof of ownership for deduplicated cloud storage

J Dave, P Faruki, V Laxmi, B Bezawada… - Proceedings of the 10th …, 2017 - dl.acm.org
The rapid increment in volume of outsourced data has raised an issue of data management
for Cloud Storage Server. To solve this issue, Deduplication, a data compression technique …

FloVasion: towards detection of non-sensitive variable based evasive information-flow in android apps

B Buddhadev, P Faruki, MS Gaur… - IETE Journal of …, 2022 - Taylor & Francis
Smartphones are enriched by applications (apps) available through the mobile ecosystem.
Various studies have reported that apps leaking sensitive user and device information are …

An empirical study to estimate the stability of random forest classifier on the hybrid features recommended by filter based feature selection technique

SLS Darshan, CD Jaidhar - International Journal of Machine Learning and …, 2020 - Springer
The emergence of advanced malware is a serious threat to information security. A prominent
technique that identifies sophisticated malware should consider the runtime behaviour of the …