A three-way decision making approach to malware analysis using probabilistic rough sets

M Nauman, N Azam, JT Yao - Information Sciences, 2016 - Elsevier
Malware analysis aims to identify malware by examining applications behaviour on the host
operating system. A common issue in malware analysis is how to mitigate and handle the …

Integrity verification and behavioral classification of a large dataset applications pertaining smart OS via blockchain and generative models

S Jan, S Musa, T Ali, M Nauman, S Anwar… - Expert …, 2021 - Wiley Online Library
Malware analysis and detection over the Android have been the focus of considerable
research, during recent years, as customer adoption of Android attracted a corresponding …

Design and implementation of an efficient framework for behaviour attestation using n-call slides

R Ismail, TA Syed, S Musa - … of the 8th International Conference on …, 2014 - dl.acm.org
We present design and implementation of behaviour based attestation of an enterprise
centric application. Remote attestation is used to measure the trustworthiness of the target …

On the Design and Security of Collective Remote Attestation Protocols

S Ahmadi, J Le-Papin, L Chen, B Dongol… - arxiv preprint arxiv …, 2024 - arxiv.org
Collective remote attestation (CRA) is a security service that aims to efficiently identify
compromised (often low-powered) devices in a (heterogeneous) network. The last few years …

The remote attestation design based on the identity and attribute certificates

Y Liang, KE Guo, J Li - 2014 11th International Computer …, 2014 - ieeexplore.ieee.org
In order to solve the problem of trusted authentication between terminals, as well as
terminals and the server, and to establish a safe and reliable network environment, a remote …

Clustering system call arguments for remote attestation

H Li, X Tian, W Wei, C Sun - International Conference on Network …, 2012 - Springer
In trusted computing, remote attestation is an essential feature to determine the
trustworthiness of a remote platform by analyzing its integrity. In this paper, we present a …

Multiple Objective Compromise Optimization Method to Analyze the Strategies of Nanotechnology in Taiwan

HK Chiou, GS Liu, GH Tzeng… - 2009 Symposia and …, 2009 - ieeexplore.ieee.org
Analytic Hierarchy Process (AHP) is a popular technique often used to model subjective
decision-making processes based on multiple attributes; Hwang and Yoon (1981) originally …

A complete behavioral measurement and reporting: optimized for mobile devices

T Ali, MFA Zuhairi, J Ali, S Musa, M Nauman - First EAI International …, 2017 - eudl.eu
Security is an important factor in today's IT infrastructure due to complex and vast variety of
malware threats. One way to tackle these malware is via signaturebased techniques …

An Efficient and Flexible Dynamic Remote Attestation Method

H Li, S Wang - 2014 Ninth International Conference on …, 2014 - ieeexplore.ieee.org
Remote attestation is an important characteristic of trusted computing technology which
provides reliable evidence that a trusted environment actually exists. In this paper, we …

Achieving attestation with less effort: an indirect and configurable approach to integrity reporting

JH Huh, H Kim, J Lyle, A Martin - … of the sixth ACM workshop on Scalable …, 2011 - dl.acm.org
This paper proposes an indirect attestation paradigm for verifying the trustworthiness of end
user platforms. This approach overcomes several criticisms of attestation by maintaining the …