An ontology-driven framework for knowledge representation of digital extortion attacks

M Keshavarzi, HR Ghaffary - Computers in Human Behavior, 2023 - Elsevier
With the COVID-19 pandemic and the growing influence of the Internet in critical sectors of
industry and society, cyberattacks have not only not declined, but have risen sharply. In the …

A Survey of strategy-driven evasion methods for PE malware: transformation, concealment, and attack

J Geng, J Wang, Z Fang, Y Zhou, D Wu, W Ge - Computers & Security, 2024 - Elsevier
The continuous proliferation of malware poses a formidable threat to the cyberspace
landscape. Researchers have proffered a multitude of sophisticated defense mechanisms …

Yamme: a yara-byte-signatures metamorphic mutation engine

A Coscia, V Dentamaro, S Galantucci… - IEEE Transactions …, 2023 - ieeexplore.ieee.org
Recognition of known malicious patterns through signature-based systems is unsuccessful
against malware for which no known signature exists to identify them. These include not only …

A game-theoretic approach to containing artificial general intelligence: Insights from highly autonomous aggressive malware

TR McIntosh, T Susnjak, T Liu, P Watters… - IEEE Transactions …, 2024 - ieeexplore.ieee.org
Artificial General Intelligence (AGI) promises transformative societal changes but poses
safety and containment challenges. Large Language Models like ChatGPT have intensified …

HEAVEN: A Hardware-Enhanced AntiVirus ENgine to accelerate real-time, signature-based malware detection

M Botacin, MZ Alves, D Oliveira, A Grégio - Expert Systems with …, 2022 - Elsevier
Antiviruses (AVs) are computing-intensive applications that rely on constant monitoring of
OS events and on applying pattern matching procedures on binaries to detect malware. In …

[HTML][HTML] WebAssembly diversification for malware evasion

J Cabrera-Arteaga, M Monperrus, T Toady… - Computers & Security, 2023 - Elsevier
WebAssembly has become a crucial part of the modern web, offering a faster alternative to
JavaScript in browsers. While boosting rich applications in browser, this technology is also …

CMD: co-analyzed iot malware detection and forensics via network and hardware domains

Z Zhao, Z Li, J Yu, F Zhang, X **e… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
With the widespread use of Internet of Things (IoT) devices, malware detection has become
a hot spot for both academic and industrial communities. Existing approaches can be …

Machine learning (in) security: A stream of problems

F Ceschin, M Botacin, A Bifet, B Pfahringer… - … Threats: Research and …, 2024 - dl.acm.org
Machine Learning (ML) has been widely applied to cybersecurity and is considered state-of-
the-art for solving many of the open issues in that field. However, it is very difficult to evaluate …

[PDF][PDF] A Review of Intrusion Detection System Methods and Techniques: Past, Present and Future

YH Alagrash, HS Mehdy… - International Journal on …, 2023 - iotpe.tabaelm.com
The intrusion detection system (IDS) is a rapidly expanding field that continues to attract
interest due to the increasing variety of its applications. It has been the topic of research, with …

{DVa}: Extracting Victims and Abuse Vectors from Android Accessibility Malware

H Xu, M Yao, R Zhang, MM Dawoud, J Park… - 33rd USENIX Security …, 2024 - usenix.org
The Android accessibility (a11y) service is widely abused by malware to conduct on-device
monetization fraud. Existing mitigation techniques focus on malware detection but overlook …