Conan: A Practical Real-Time APT Detection System With High Accuracy and Efficiency

C Xiong, T Zhu, W Dong, L Ruan… - … on Dependable and …, 2020 - ieeexplore.ieee.org
Advanced Persistent Threat (APT) attacks have caused serious security threats and financial
losses worldwide. Various real-time detection mechanisms that combine context information …

DyDroid: Measuring dynamic code loading and its security implications in Android applications

Z Qu, S Alam, Y Chen, X Zhou… - 2017 47th Annual …, 2017 - ieeexplore.ieee.org
Android has provided dynamic code loading (DCL) since API level one. DCL allows an app
developer to load additional code at runtime. DCL raises numerous challenges with regards …

AppBox: A Black-Box Application Sandboxing Technique for Mobile App Management Solutions

M Ahmad, F Bergadano, V Costamagna… - … IEEE Symposium on …, 2023 - ieeexplore.ieee.org
Several Mobile Device Management (MDM) and Mobile Application Management (MAM)
services have been launched on the market. However, these services suffer from two …

Efficient application protection against untrusted operating systems

H Murtaza, HA Tanweer, M Ahmad… - VFAST Transactions on …, 2022 - vfast.org
Commodity monolithic systems are enormous, having lots of unprotection that leads to
attacks. In this era of increasing technology, relying on mobile devices and other electronic …

[PDF][PDF] Security analysis of hardware-OS interfaces in Linux

F Hetzelt - 2022 - d-nb.info
Abstract While the System Call (SC) interface between the userspace and the Linux
Operating System (OS) has received much attention, the interface between the hardware …

Rt-Apt: A Real-Time Apt Anomaly Detection Method for Large-Scale Provenance Graph

Z Weng, W Zhang, T Zhu, Z Dou, Z Ye, H Sun… - Available at SSRN … - papers.ssrn.com
Abstract Advanced Persistent Threats (APTs) are prevalent in cyber attacks, where attackers
employ advanced techniques to control targets and exfiltrate data without being detected by …

Paris: A Practical, Adaptive Trace-Fetching and Real-Time Malicious Behavior Detection System

J Wang, L Wang, Z Li, H Yu, X Shen… - Adaptive Trace-Fetching … - papers.ssrn.com
The escalating sophistication of cyber-attacks and the widespread utilization of stealth
tactics have led to significant security threats globally. Nevertheless, the existing static …