A review on malware analysis for iot and android system

CS Yadav, S Gupta - SN Computer Science, 2022 - Springer
Today all humankind is willing to avail more facilities and hopes everything should be
available with a click of the button. In order to offer different services, the developers have …

Similarity hash based scoring of portable executable files for efficient malware detection in IoT

AP Namanya, IU Awan, JP Disso, M Younas - Future Generation Computer …, 2020 - Elsevier
The current rise in malicious attacks shows that existing security systems are bypassed by
malicious files. Similarity hashing has been adopted for sample triaging in malware analysis …

Android ransomware analysis using convolutional neural network and fuzzy hashing features

H Rodriguez-Bazan, G Sidorov… - IEEE …, 2023 - ieeexplore.ieee.org
Most of the time, cybercriminals look for new ways to bypass security controls by improving
their attacks. In the 1980s, attackers developed malware to kidnap user data by requesting …

[HTML][HTML] A procedure for tracing chain of custody in digital image forensics: A paradigm based on grey hash and blockchain

M Ali, A Ismail, H Elgohary, S Darwish, S Mesbah - Symmetry, 2022 - mdpi.com
Digital evidence is critical in cybercrime investigations because it is used to connect
individuals to illegal activity. Digital evidence is complicated, diffuse, volatile, and easily …

Nation-state threat actor attribution using fuzzy hashing

M Kida, O Olukoya - IEEE Access, 2022 - ieeexplore.ieee.org
Recent years have seen a rise in state-sponsored malware. Advanced Persistent Threat
groups (APTs) have been waging a covert war with little repercussions due to the …

[HTML][HTML] A temporal analysis and evaluation of fuzzy hashing algorithms for Android malware analysis

M Fleming, O Olukoya - Forensic Science International: Digital Investigation, 2024 - Elsevier
Fuzzy hashing has been utilised in digital forensics and malware analysis for malware
detection, malware variant classification, file clustering, document similarity detection …

[HTML][HTML] Android malware classification based on fuzzy hashing visualization

H Rodriguez-Bazan, G Sidorov… - Machine Learning and …, 2023 - mdpi.com
The proliferation of Android-based devices has brought about an unprecedented surge in
mobile application usage, making the Android ecosystem a prime target for cybercriminals …

Understanding uses and misuses of similarity hashing functions for malware detection and family clustering in actual scenarios

M Botacin, VHG Moia, F Ceschin… - Forensic Science …, 2021 - Elsevier
An everyday growing number of malware variants target end-users and organizations. To
reduce the amount of individual malware handling, security analysts apply techniques for …

Imaging and evaluating the memory access for malware

Ç Yücel, A Koltuksuz - Forensic Science International: Digital Investigation, 2020 - Elsevier
Malware analysis is a forensic process. After infection and the damage represented itself
with the full scale, then the analysis of the attack, the structure of the executable and the aim …

Improving uncertainty in chain of custody for image forensics investigation applications

HM Elgohary, SM Darwish, SM Elkaffas - IEEE Access, 2022 - ieeexplore.ieee.org
Cybercrime investigations rely heavily on digital evidence to establish links between
suspects and the criminal conduct they are allegedly involved in. As a result, digital …