[HTML][HTML] Enhancing cyber-resilience for small and medium-sized organizations with prescriptive malware analysis, detection and response

LF Ilca, OP Lucian, TC Balan - Sensors, 2023 - mdpi.com
In this study, the methodology of cyber-resilience in small and medium-sized organizations
(SMEs) is investigated, and a comprehensive solution utilizing prescriptive malware …

Triboelectric sensor-empowered intelligent mouse combined with machine learning technology strides toward a computer security system

W Zhang, M Liu, X Lü, L Deng, X Fan, G Cheng… - Nano Energy, 2024 - Elsevier
The computer mouse is one of the most common tools used for human-machine interfacing.
The human behavior studying by click operation using an intelligent mouse and related …

Volmemlyzer: Volatile memory analyzer for malware classification using feature engineering

AH Lashkari, B Li, TL Carrier… - 2021 Reconciling Data …, 2021 - ieeexplore.ieee.org
Memory forensics is a fundamental step that inspects malicious activities during live
malware infection. Memory analysis not only captures malware footprints but also collects …

SNDMI: Spyware network traffic detection method based on inducement operations

J Peng, C Guo, Y **, Y Cui, Y Chen, G Shen - Computers & Security, 2024 - Elsevier
Spyware is a type of malware widely used by attackers to steal confidential information from
users without their knowledge. It has the characteristics of high latency, high stealth, and …

Responding to targeted stealthy attacks on android using timely-captured memory dumps

J Bellizzi, M Vella, C Colombo… - IEEE Access, 2022 - ieeexplore.ieee.org
The increasing dominance of Android smartphones for everyday communication and data
processing makes long-term stealthy malware an even more dangerous threat. Recent …

[HTML][HTML] Module extraction and DLL hijacking detection via single or multiple memory dumps

P Fernández-Álvarez, RJ Rodríguez - Forensic Science International …, 2023 - Elsevier
A memory dump contains the current state of a system's physical memory at the time of its
acquisition. Among other things, it contains the processes that were running at the time of …

CBFISKD: A combinatorial-based fuzzy inference system for keylogger detection

FE Ayo, JB Awotunde, OA Olalekan, AL Imoize, CT Li… - Mathematics, 2023 - mdpi.com
A keylogger is a type of spyware that records keystrokes from the user's keyboard to steal
confidential information. The problems with most keylogger methods are the lack of …

AirKeyLogger: Hardwareless Air-Gap Keylogging Attack

M Guri - 2023 IEEE 47th Annual Computers, Software, and …, 2023 - ieeexplore.ieee.org
This paper presents AirKeyLogger-a novel radio frequency (RF) keylogging attack for air-
gapped computers. Our keylogger exploits radio emissions from a computer's power supply …

[HTML][HTML] Vedrando: A novel way to reveal stealthy attack steps on android through memory forensics

J Bellizzi, E Losiouk, M Conti, C Colombo… - Journal of Cybersecurity …, 2023 - mdpi.com
The ubiquity of Android smartphones makes them targets of sophisticated malware, which
maintain long-term stealth, particularly by offloading attack steps to benign apps. Such …

Responding to living-off-the-land tactics using just-in-time memory forensics (JIT-MF) for android

J Bellizzi, M Vella, C Colombo… - arxiv preprint arxiv …, 2021 - arxiv.org
Digital investigations of stealthy attacks on Android devices pose particular challenges to
incident responders. Whereas consequential late detection demands accurate and …