A survey on malware detection using data mining techniques
In the Internet age, malware (such as viruses, trojans, ransomware, and bots) has posed
serious and evolving security threats to Internet users. To protect legitimate users from these …
serious and evolving security threats to Internet users. To protect legitimate users from these …
Tight arms race: Overview of current malware threats and trends in their detection
Cyber attacks are currently blooming, as the attackers reap significant profits from them and
face a limited risk when compared to committing the “classical” crimes. One of the major …
face a limited risk when compared to committing the “classical” crimes. One of the major …
Kernel pooling for convolutional neural networks
Abstract Convolutional Neural Networks (CNNs) with Bilinear Pooling, initially in their full
form and later using compact representations, have yielded impressive performance gains …
form and later using compact representations, have yielded impressive performance gains …
[HTML][HTML] The Ransomware-as-a-Service economy within the darknet
Ransomware is an epidemic that adversely affects the lives of both individuals and large
companies, where criminals demand payments to release infected digital assets. In the …
companies, where criminals demand payments to release infected digital assets. In the …
A survey on automated dynamic malware-analysis techniques and tools
Anti-virus vendors are confronted with a multitude of potentially malicious samples today.
Receiving thousands of new samples every day is not uncommon. The signatures that …
Receiving thousands of new samples every day is not uncommon. The signatures that …
Detecting environment-sensitive malware
The execution of malware in an instrumented sandbox is a widespread approach for the
analysis of malicious code, largely because it sidesteps the difficulties involved in the static …
analysis of malicious code, largely because it sidesteps the difficulties involved in the static …
An analysis of underground forums
Underground forums, where participants exchange information on abusive tactics and
engage in the sale of illegal goods and services, are a form of online social network (OSN) …
engage in the sale of illegal goods and services, are a form of online social network (OSN) …
{ZOZZLE}: Fast and precise {In-Browser}{JavaScript} malware detection
JavaScript malware-based attacks account for a large fraction of successful mass-scale
exploitation happening today. Attackers like JavaScript-based attacks because they can be …
exploitation happening today. Attackers like JavaScript-based attacks because they can be …
Click trajectories: End-to-end analysis of the spam value chain
Spam-based advertising is a business. While it has engendered both widespread antipathy
and a multi-billion dollar anti-spam industry, it continues to exist because it fuels a profitable …
and a multi-billion dollar anti-spam industry, it continues to exist because it fuels a profitable …
Nobody sells gold for the price of silver: Dishonesty, uncertainty and the underground economy
The underground economy has attracted a lot of attention recently as a key component of
cybercrime. In particular the IRC markets for stolen identities, phishing kits, botnets, and …
cybercrime. In particular the IRC markets for stolen identities, phishing kits, botnets, and …