نتایج جستجو برای: malware detection

تعداد نتایج: 569207  

Journal: :CoRR 2017
Jarilyn M. Hernández Jiménez Jeffrey A. Nichols Katerina Goseva-Popstojanova Stacy J. Prowell Robert A. Bridges

Malware detection is challenging when faced with automatically generated and polymorphic malware, as well as with rootkits, which are exceptionally hard to detect. In an attempt to contribute towards addressing these challenges, we conducted a proof of concept study that explored the use of power consumption for detection of malware presence in a generalpurpose computer. The results of our expe...

Journal: :Research in Computing Science 2016
Alex I. Valencia-Valencia Sofía N. Galicia-Haro

Malware analysis is a more difficult task each time, due to malware developers are taking care of avoiding and detection techniques, from obfuscation to destroying, hard drive (if malware detect that has been analyzed). In this paper we release a malware dynamic analysis of six types of malware: Trojans, Worms, Virus, Trojan-Spys, Backdoors y Rootkits, moreover a set of Whiteware using an n-gra...

Journal: :Computers & Security 2015
Davide Maiorca Davide Ariu Igino Corona Marco Aresu Giorgio Giacinto

In order to effectively evade anti-malware solutions, Android malware authors are progressively resorting to automatic obfuscation strategies. Recent works have shown, on small-scale experiments, the possibility of evading anti-malware engines by applying simple obfuscation transformations on previously detected malware samples. In this paper, we provide a large-scale experiment in which the de...

2016
Ananda Rao Radhika Raju

Internet Traffic classification is vital for various network activities such as detection of malware. Security is major issue of concern which accounts for the reputation and reliability of system. Malware effects the system adversely results in data loss or abnormal functioning. Hence, detection and as well as removal of malware is crucial. Combining set of classifiers called as ensembling pro...

Journal: :Inf. Sci. 2013
Igor Santos Felix Brezo Xabier Ugarte-Pedrero Pablo García Bringas

Malware can be defined as any type of malicious code that has the potential to harm a computer or network. The volume of malware is growing faster every year and poses a serious global security threat. Consequently, malware detection has become a critical topic in computer security. Currently, signature-based detection is the most widespread method used in commercial antivirus. In spite of the ...

2014
Hyun Jae Kang Jae-wook Jang Aziz Mohaisen Huy Kang Kim

Thousands of malicious applications targeting mobile devices, including the popular Android platform, are created every day. A large number of those applications are created by a small number of professional underground actors, however previous studies overlooked such information as a feature in detecting and classifying malware, and in attributing malware to creators. Guided by this insight, w...

2013
Kirti Mathur Saroj Hiranwal

The computer technology has emerged as a necessity in our day to day life to deal with various aspects like education, banking, communication, entertainment etc. Computer system’s security is threatened by weapons named as malware to accomplish malicious intention of its writers. Various solutions are available to detect these threats like AV Scanners, Intrusion Detection System, and Firewalls ...

Journal: :Comput. J. 2015
Shahid Alam Issa Traoré Ibrahim Sogukpinar

Metamorphism is a technique that mutates the binary code using different obfuscations and never keeps the same sequence of opcodes in the memory. This stealth technique provides the capability to a malware for evading detection by simple signature-based (such as instruction sequences, byte sequences and string signatures) anti-malware programs. In this paper, we present a new scheme named Annot...

2013
Shane S. Clark Benjamin Ransford Amir Rahmati Shane Guineau Jacob Sorber Wenyuan Xu Kevin Fu

Medical devices based on embedded systems are ubiquitous in clinical settings. Increasingly, they connect to networks and run off-the-shelf operating systems vulnerable to malware. But strict validation requirements make it prohibitively difficult or costly to use anti-virus software or automated operating system updates on these systems. Our add-on monitoring system, WattsUpDoc, uses a traditi...

2016
Aswini S Palani Raja

A Malware is a very big threat in today’s computing world. It continues to grow in volume and evolve in complexity. Modern malware uses advanced techniques to hide from static and dynamic analysis tools. The existing system uses classification based and regression based approach for detection. The proposed system utilizes the classification based approach and regression based approach for detec...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید