Malware detection issues, challenges, and future directions: A survey
The evolution of recent malicious software with the rising use of digital services has
increased the probability of corrupting data, stealing information, or other cybercrimes by …
increased the probability of corrupting data, stealing information, or other cybercrimes by …
[PDF][PDF] Static code analysis tools: A systematic literature review
D Stefanović, D Nikolić, D Dakić… - Ann. DAAAM Proc. Int …, 2020 - academia.edu
Static code analysis tools are being increasingly used to improve code quality. Such tools
can statically analyze the code to find bugs, security vulnerabilities, security spots …
can statically analyze the code to find bugs, security vulnerabilities, security spots …
Wobfuscator: Obfuscating javascript malware via opportunistic translation to webassembly
To protect web users from malicious JavaScript code, various malware detectors have been
proposed, which analyze and classify code as malicious or benign. State-of-the-art detectors …
proposed, which analyze and classify code as malicious or benign. State-of-the-art detectors …
An empirical study on the effects of obfuscation on static machine learning-based malicious javascript detectors
K Ren, W Qiang, Y Wu, Y Zhou, D Zou… - Proceedings of the 32nd …, 2023 - dl.acm.org
Machine learning is increasingly being applied to malicious JavaScript detection in
response to the growing number of Web attacks and the attendant costly manual …
response to the growing number of Web attacks and the attendant costly manual …
[HTML][HTML] An empirical study of problems and evaluation of IoT malware classification label sources
T Lei, J Xue, Y Wang, T Baker, Z Niu - Journal of King Saud University …, 2024 - Elsevier
With the proliferation of malware on IoT devices, research on IoT malicious code has also
become more mature. Most studies use learning models to detect or classify malware …
become more mature. Most studies use learning models to detect or classify malware …
JStrong: Malicious JavaScript detection based on code semantic representation and graph neural network
Y Fang, C Huang, M Zeng, Z Zhao, C Huang - Computers & Security, 2022 - Elsevier
Web development technology has experienced significant progress. The creation of
JavaScript has highly enriched the interactive ability of the client. However, the attacker uses …
JavaScript has highly enriched the interactive ability of the client. However, the attacker uses …
Detecting malicious JavaScript code based on semantic analysis
Y Fang, C Huang, Y Su, Y Qiu - Computers & Security, 2020 - Elsevier
Web development technology has undergone tremendous evolution, the creation of
JavaScript has greatly enriched the interactive capabilities of the client. However, attackers …
JavaScript has greatly enriched the interactive capabilities of the client. However, attackers …
[PDF][PDF] Feature-based Malicious URL and Attack Type Detection Using Multi-class Classification.
Nowadays, malicious URLs are the common threat to the businesses, social networks, net-
banking. Existing approaches have focused on binary detection ie, either the URL is …
banking. Existing approaches have focused on binary detection ie, either the URL is …
Privacy issues of android application permissions: A literature review
Android is an application platform for mobile devices. It comprises of the operating system,
software framework, and core programs. This platform uses permissions to hide precious …
software framework, and core programs. This platform uses permissions to hide precious …
[HTML][HTML] A survey and taxonomy of program analysis for IoT platforms
Heterogeneity in the Internet of Things (IoT) environment is a critical issue for supporting
security and privacy. IoT environment has become an open invitation to hackers to control …
security and privacy. IoT environment has become an open invitation to hackers to control …