Similarity hash based scoring of portable executable files for efficient malware detection in IoT

AP Namanya, IU Awan, JP Disso, M Younas - Future Generation Computer …, 2020 - Elsevier
The current rise in malicious attacks shows that existing security systems are bypassed by
malicious files. Similarity hashing has been adopted for sample triaging in malware analysis …

Automated labeling of unknown contracts in ethereum

R Norvill, BBF Pontiveros, R State… - 2017 26th …, 2017 - ieeexplore.ieee.org
Smart contracts have recently attracted interest from diverse fields including law and finance.
Ethereum in particular has grown rapidly to accommodate an entire ecosystem of contracts …

[HTML][HTML] Improving file-level fuzzy hashes for malware variant classification

I Shiel, S O'Shaughnessy - Digital Investigation, 2019 - Elsevier
Malware analysts need to be able to accurately and swiftly predict family membership as
well as to determine that a suspect file contains malicious content. Previous research has …

[PDF][PDF] Impact of Portable Executable Header Features on Malware Detection Accuracy.

HH Al-Khshali, M Ilyas - Computers, Materials & Continua, 2023 - researchgate.net
One aspect of cybersecurity, incorporates the study of Portable Executables (PE) files
maleficence. Artificial Intelligence (AI) can be employed in such studies, since AI has the …

The method and software tool for identification of the machine code architecture in cyberphysical devices

I Kotenko, K Izrailov, M Buinevich - Journal of Sensor and Actuator …, 2023 - mdpi.com
This work solves the problem of identification of the machine code architecture in
cyberphysical devices. A basic systematization of the Executable and Linkable Format and …

An approach for stego-insider detection based on a hybrid nosql database

I Kotenko, A Krasov, I Ushakov, K Izrailov - Journal of Sensor and …, 2021 - mdpi.com
One of the reasons for the implementation of information security threats in organizations is
the insider activity of its employees. There is a big challenge to detect stego-insiders …

Nation-state threat actor attribution using fuzzy hashing

M Kida, O Olukoya - IEEE Access, 2022 - ieeexplore.ieee.org
Recent years have seen a rise in state-sponsored malware. Advanced Persistent Threat
groups (APTs) have been waging a covert war with little repercussions due to the …

Ransomware analysis using cyber kill chain

QKA Mirza, M Brown, O Halling… - 2021 8th International …, 2021 - ieeexplore.ieee.org
The havoc caused by ransomware in the recent past is far greater than any other form of
malware. Victims of this specific form of malware include, but not limited to; SMEs, large …

A tool to compute approximation matching between windows processes

RJ Rodríguez, M Martín-Pérez… - 2018 6th International …, 2018 - ieeexplore.ieee.org
Finding identical digital objects (or artifacts) during a forensic analysis is commonly
achieved by means of cryptographic hashing functions, such as MD5, SHA1, or SHA-256, to …

Code generation for core processors

P Marwedel - Proceedings of the 34th annual Design Automation …, 1997 - dl.acm.org
This tutorial responds to the rapidly increasing useof cores in general and of processor
cores in particular for implementingsystems-on-a-chip. In the first part of this text, we …