A Survey of strategy-driven evasion methods for PE malware: transformation, concealment, and attack
The continuous proliferation of malware poses a formidable threat to the cyberspace
landscape. Researchers have proffered a multitude of sophisticated defense mechanisms …
landscape. Researchers have proffered a multitude of sophisticated defense mechanisms …
Enhancing malware analysis sandboxes with emulated user behavior
Cybersecurity teams have widely used malware analysis sandboxes to investigate the threat
of malware. Correspondingly, armored malware adopts various anti-sandbox techniques to …
of malware. Correspondingly, armored malware adopts various anti-sandbox techniques to …
Exploring how regulators face platform business issues in the lifecycle stages: Evidence of iranian ride-hailing platform business
Abstract The emergence of Platform Businesses (PBs) has caused a conflict between the
traditional and new economic actors. Furthermore, it has escalated to government bodies …
traditional and new economic actors. Furthermore, it has escalated to government bodies …
See through walls: Detecting malware in sgx enclaves with sgx-bouncer
Intel Software Guard Extensions (SGX) offers strong confidentiality and integrity protection to
software programs running in untrusted operating systems. Unfortunately, SGX may be …
software programs running in untrusted operating systems. Unfortunately, SGX may be …
[PDF][PDF] Design and implementation of a collaborative lightweight malware analysis sandbox using container virtualization
R Mogicato, A Zermin - Universität Zürich, Zürich, Switzerland, Tech …, 2023 - files.ifi.uzh.ch
Malware as an attack vector for cyber-physical systems has remained a relevant security
threat, thus the development of novel analysis approaches and the generation of relevant …
threat, thus the development of novel analysis approaches and the generation of relevant …
[PDF][PDF] Defeating anti-debugging techniques for malware analysis using a debugger
JW Kim, J Bang, MJ Choi - Advances in Science …, 2020 - pdfs.semanticscholar.org
Cyberattacks such as spear phishing and malspam pretending to be companies, institutes,
and government officials are increasing and evolving. Malware has a variety of purposes …
and government officials are increasing and evolving. Malware has a variety of purposes …
Envfaker: A method to reinforce linux sandbox based on tracer, filter and emulator against environmental-sensitive malware
C **e, Y Guo, S Shi, Y Sheng, X Chen… - 2021 IEEE 20th …, 2021 - ieeexplore.ieee.org
Sandbox is an excellent tool for dynamic malware analysis. However, the sandbox detection
techniques are increasingly adopted to develop malwares, which has been a significant …
techniques are increasingly adopted to develop malwares, which has been a significant …
Role of Logistic Regression in Malware Detection: A Systematic Literature Review
When brain, the first virus known introduced in computer systems, requirement of security
was raised. Malware Detection turn out to be more vital when network is used for transferring …
was raised. Malware Detection turn out to be more vital when network is used for transferring …
Datascience in support of cybersecurity operations: Adaptable, robust and explainable anomaly detection for security analysts
A Dey - 2022 - theses.hal.science
To defend against sophisticated cyber-criminal organizations and APTs, IT system operators
should define and enforce strict security policies. However, defining and maintining perfect …
should define and enforce strict security policies. However, defining and maintining perfect …
Realistic simulation of users for IT systems in cyber ranges
Generating user activity is a key capability for both evaluating security monitoring tools as
well as improving the credibility of attacker analysis platforms (eg, honeynets). In this paper …
well as improving the credibility of attacker analysis platforms (eg, honeynets). In this paper …