Malware detection issues, challenges, and future directions: A survey

FA Aboaoja, A Zainal, FA Ghaleb, BAS Al-Rimy… - Applied Sciences, 2022 - mdpi.com
The evolution of recent malicious software with the rising use of digital services has
increased the probability of corrupting data, stealing information, or other cybercrimes by …

[PDF][PDF] Static code analysis tools: A systematic literature review

D Stefanović, D Nikolić, D Dakić… - Ann. DAAAM Proc. Int …, 2020 - academia.edu
Static code analysis tools are being increasingly used to improve code quality. Such tools
can statically analyze the code to find bugs, security vulnerabilities, security spots …

Wobfuscator: Obfuscating javascript malware via opportunistic translation to webassembly

A Romano, D Lehmann, M Pradel… - 2022 IEEE Symposium …, 2022 - ieeexplore.ieee.org
To protect web users from malicious JavaScript code, various malware detectors have been
proposed, which analyze and classify code as malicious or benign. State-of-the-art detectors …

An empirical study on the effects of obfuscation on static machine learning-based malicious javascript detectors

K Ren, W Qiang, Y Wu, Y Zhou, D Zou… - Proceedings of the 32nd …, 2023 - dl.acm.org
Machine learning is increasingly being applied to malicious JavaScript detection in
response to the growing number of Web attacks and the attendant costly manual …

[HTML][HTML] An empirical study of problems and evaluation of IoT malware classification label sources

T Lei, J Xue, Y Wang, T Baker, Z Niu - Journal of King Saud University …, 2024 - Elsevier
With the proliferation of malware on IoT devices, research on IoT malicious code has also
become more mature. Most studies use learning models to detect or classify malware …

JStrong: Malicious JavaScript detection based on code semantic representation and graph neural network

Y Fang, C Huang, M Zeng, Z Zhao, C Huang - Computers & Security, 2022 - Elsevier
Web development technology has experienced significant progress. The creation of
JavaScript has highly enriched the interactive ability of the client. However, the attacker uses …

Detecting malicious JavaScript code based on semantic analysis

Y Fang, C Huang, Y Su, Y Qiu - Computers & Security, 2020 - Elsevier
Web development technology has undergone tremendous evolution, the creation of
JavaScript has greatly enriched the interactive capabilities of the client. However, attackers …

[PDF][PDF] Feature-based Malicious URL and Attack Type Detection Using Multi-class Classification.

DR Patil, JB Patil - ISeCure, 2018 - sid.ir
Nowadays, malicious URLs are the common threat to the businesses, social networks, net-
banking. Existing approaches have focused on binary detection ie, either the URL is …

Privacy issues of android application permissions: A literature review

G Shrivastava, P Kumar, D Gupta… - Transactions on …, 2020 - Wiley Online Library
Android is an application platform for mobile devices. It comprises of the operating system,
software framework, and core programs. This platform uses permissions to hide precious …

[HTML][HTML] A survey and taxonomy of program analysis for IoT platforms

AA Hamza, IT Abdel-Halim, MA Sobh… - Ain Shams Engineering …, 2021 - Elsevier
Heterogeneity in the Internet of Things (IoT) environment is a critical issue for supporting
security and privacy. IoT environment has become an open invitation to hackers to control …