The steady growth in the number of deployed Internet of Things (IoT) devices has been paralleled with an equal growth in the number of malicious software (malware) targeting …
IoT malware detection using control flow graph (CFG)-based features and deep learning networks are widely explored. The main goal of this study is to investigate the robustness of …
This paper proposes a technique for automatically learning semantic malware signatures for Android from very few samples of a malware family. The key idea underlying our technique …
The acceptance of the Internet of Things (IoT) for both household and industrial applications is accompanied by the rapid growth of IoT malware. With the increase of their attack surface …
The growth in the number of android and Internet of Things (IoT) devices has witnessed a parallel increase in the number of malicious software (malware) that can run on both …
Y Du, J Wang, Q Li - IEEE Access, 2017 - ieeexplore.ieee.org
With the development of code obfuscation and application repackaging technologies, an increasing number of structural information-based methods have been proposed for …
X Yi, J Wu, G Li, AK Bashir, J Li… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Healthcare cyber physical systems (HCPS) always pursuing high availability allow software providers to adopt multiple kinds of development languages to reuse third-party program …
Binary analysis is a well-investigated area in software engineering and security. Given real- world program binaries, generating test inputs which cause the binaries to crash is crucial …
Low level code is challenging: It lacks structure, it uses jumps and symbolic addresses, the control flow is often highly optimized, and registers and memory locations may be reused in …