The rise of “malware”: Bibliometric analysis of malware study
Malicious software (malware) is a computer program designed to create harmful and
undesirable effects. It considered as one of the many dangerous threats for Internet users …
undesirable effects. It considered as one of the many dangerous threats for Internet users …
Semantics-aware detection of targeted attacks: a survey
In today's interconnected digital world, targeted attacks have become a serious threat to
conventional computer systems and critical infrastructure alike. Many researchers contribute …
conventional computer systems and critical infrastructure alike. Many researchers contribute …
[HTML][HTML] Getting to the root of the problem: A detailed comparison of kernel and user level data for dynamic malware analysis
Dynamic malware analysis is fast gaining popularity over static analysis since it is not easily
defeated by evasion tactics such as obfuscation and polymorphism. During dynamic …
defeated by evasion tactics such as obfuscation and polymorphism. During dynamic …
Toward a taxonomy of malware behaviors
ARA Grégio, VM Afonso, DSF Filho… - The Computer …, 2015 - academic.oup.com
Malicious code attacks pose a serious threat to the security of information systems, as
malware evolved from innocuous conceptual software to advanced and destructive cyber …
malware evolved from innocuous conceptual software to advanced and destructive cyber …
The evolution of process hiding techniques in malware-current threats and possible countermeasures
Rootkits constitute a significant threat to modern computing and information systems. Since
their first appearance in the early 1990's they have steadily evolved, adapting to ever …
their first appearance in the early 1990's they have steadily evolved, adapting to ever …
Terminator: A Secure Coprocessor to Accelerate Real-Time AntiViruses Using Inspection Breakpoints
AntiViruses (AVs) are essential to face the myriad of malware threatening Internet users. AVs
operate in two modes: on-demand checks and real-time verification. Software-based real …
operate in two modes: on-demand checks and real-time verification. Software-based real …
[PDF][PDF] Mmale—a methodology for malware analysis in linux environments
JJ de Vicente Mohino, J Bermejo-Higuera… - … , Materials & Continua, 2021 - academia.edu
In a computer environment, an operating system is prone to malware, and even the Linux
operating system is not an exception. In recent years, malware has evolved, and attackers …
operating system is not an exception. In recent years, malware has evolved, and attackers …
MalView: Interactive visual analytics for comprehending malware behavior
Malicious applications are usually comprehended through two major techniques, namely
static and dynamic analyses. Through static analysis, a given malicious program is parsed …
static and dynamic analyses. Through static analysis, a given malicious program is parsed …
Classifying malicious system behavior using event propagation trees
S Marschalek, R Luh, M Kaiser… - Proceedings of the 17th …, 2015 - dl.acm.org
Behavior-based analysis of dynamically executed software has become an established
technique to identifying and analyzing potential malware. Most solutions rely on API or …
technique to identifying and analyzing potential malware. Most solutions rely on API or …
Interactive, visual-aided tools to analyze malware behavior
ARA Grégio, AOC Baruque, VM Afonso… - … Science and Its …, 2012 - Springer
Malicious software attacks can disrupt information systems, violating security principles of
availability, confidentiality and integrity. Attackers use malware to gain control, steal data …
availability, confidentiality and integrity. Attackers use malware to gain control, steal data …