Does every second count? time-based evolution of malware behavior in sandboxes

A Küchler, A Mantovani, Y Han, L Bilge… - NDSS 2021, Network …, 2021 - hal.science
The amount of time in which a sample is executed is one of the key parameters of a malware
analysis sandbox. Setting the threshold too high hinders the scalability and reduces the …

Spotting the malicious moment: Characterizing malware behavior using dynamic features

A Ferrante, E Medvet, F Mercaldo… - … and Security (ARES), 2016 - ieeexplore.ieee.org
While mobile devices have become more pervasive every day, the interest in them from
attackers has also been increasing, making effective malware detection tools of ultimate …

[PDF][PDF] A Friend or a Foe? Detecting Malware using Memory and CPU Features.

J Milosevic, M Malek, A Ferrante - SECRYPT, 2016 - pdfs.semanticscholar.org
With an ever-increasing and ever more aggressive proliferation of malware, its detection is
of utmost importance. However, due to the fact that IoT devices are resource-constrained, it …

DroidLight: Lightweight anomaly-based intrusion detection system for smartphone devices

S Barbhuiya, P Kilpatrick, DS Nikolopoulos - Proceedings of the 21st …, 2020 - dl.acm.org
Smartphone malware attacks are increasing alongside the growth of smartphone
applications in the market. Researchers have proposed techniques to detect malware …

Malware threats and solutions for trustworthy mobile systems design

J Milosevic, F Regazzoni, M Malek - … and Trust: Design and Deployment of …, 2017 - Springer
Trustworthiness of mobile devices involves trustworthiness of both hardware and software
components. Trustworthiness of hardware is achieved by addressing threats such as …

Malaware: Effective and efficient run-time mobile malware detector

J Milosevic, A Ferrante, M Malek - 2016 IEEE 14th Intl Conf on …, 2016 - ieeexplore.ieee.org
Effective detection of malware is of paramount importance for securing the next generation
of smart devices. Static detection, the preferred technique used so far, is not sufficiently …

Optimal integer delay budgeting on directed acyclic graphs

E Bozorgzadeh, S Ghiasi, A Takahashi… - Proceedings of the 40th …, 2003 - dl.acm.org
Delay budget is an excess delay each component of a design can tolerate under a given
timing constraint. Delay budgeting has been widely exploited to improve the design quality …

An analysis of android malware behavior

F Jaafar, G Singh, P Zavarsky - 2018 IEEE International …, 2018 - ieeexplore.ieee.org
Android is dominating the smartphone market with more users than any other mobile
operating system. But with its growing popularity, interest from attackers has also increased …

A method for preventing online games hacking using memory monitoring

CS Lee, HK Kim, HR Won, K Kim - Etri Journal, 2021 - Wiley Online Library
Several methods exist for detecting hacking programs operating within online games.
However, a significant amount of computational power is required to detect the illegal …

Predictive analytics: a shortcut to dependable computing

M Malek - Software Engineering for Resilient Systems: 9th …, 2017 - Springer
The paper lists three major issues: complexity, time and uncertainty, and identifies
dependability as the permanent challenge. In order to enhance dependability, the paradigm …