A comprehensive review on malware detection approaches

ÖA Aslan, R Samet - IEEE access, 2020 - ieeexplore.ieee.org
According to the recent studies, malicious software (malware) is increasing at an alarming
rate, and some malware can hide in the system by using different obfuscation techniques. In …

A review on the effectiveness of machine learning and deep learning algorithms for cyber security

R Geetha, T Thilagam - Archives of Computational Methods in …, 2021 - Springer
In recent years there exists a wide variety of cyber attacks with the drastic development of
the internet technology. Detection of these attacks is of more significant in today's cyber …

A new malware classification framework based on deep learning algorithms

Ö Aslan, AA Yilmaz - Ieee Access, 2021 - ieeexplore.ieee.org
Recent technological developments in computer systems transfer human life from real to
virtual environments. Covid-19 disease has accelerated this process. Cyber criminals' …

Cryptolock (and drop it): stop** ransomware attacks on user data

N Scaife, H Carter, P Traynor… - 2016 IEEE 36th …, 2016 - ieeexplore.ieee.org
Ransomware is a growing threat that encrypts auser's files and holds the decryption key until
a ransom ispaid by the victim. This type of malware is responsible fortens of millions of …

Cutting the gordian knot: A look under the hood of ransomware attacks

A Kharraz, W Robertson, D Balzarotti, L Bilge… - Detection of Intrusions …, 2015 - Springer
In this paper, we present the results of a long-term study of ransomware attacks that have
been observed in the wild between 2006 and 2014. We also provide a holistic view on how …

Novel feature extraction, selection and fusion for effective malware family classification

M Ahmadi, D Ulyanov, S Semenov, M Trofimov… - Proceedings of the sixth …, 2016 - dl.acm.org
Modern malware is designed with mutation characteristics, namely polymorphism and
metamorphism, which causes an enormous growth in the number of variants of malware …

Shieldfs: a self-healing, ransomware-aware filesystem

A Continella, A Guagnelli, G Zingaro… - Proceedings of the …, 2016 - dl.acm.org
Preventive and reactive security measures can only partially mitigate the damage caused by
modern ransomware attacks. Indeed, the remarkable amount of illicit profit and the cyber …

Copperdroid: Automatic reconstruction of android malware behaviors

K Tam, A Fattori, S Khan, L Cavallaro - NDSS Symposium 2015, 2015 - kclpure.kcl.ac.uk
Mobile devices and their application marketplaces drive the entire economy of the today's
mobile landscape. Android platforms alone have produced staggering revenues, exceeding …

Sok: History is a vast early warning system: Auditing the provenance of system intrusions

MA Inam, Y Chen, A Goyal, J Liu, J Mink… - … IEEE Symposium on …, 2023 - ieeexplore.ieee.org
Auditing, a central pillar of operating system security, has only recently come into its own as
an active area of public research. This resurgent interest is due in large part to the notion of …

On the feasibility of online malware detection with performance counters

J Demme, M Maycock, J Schmitz, A Tang… - ACM SIGARCH …, 2013 - dl.acm.org
The proliferation of computers in any domain is followed by the proliferation of malware in
that domain. Systems, including the latest mobile platforms, are laden with viruses, rootkits …