Machine learning-based android malware detection using manifest permissions

N Herron, WB Glisson, JT McDonald, RK Benton - 2021 - shsu-ir.tdl.org
The Android operating system is currently the most prevalent mobile device operating
system holding roughly 54 percent of the total global market share. Due to Android's …

Malware detection using power consumption and network traffic data

JH Jimenez… - 2019 2nd International …, 2019 - ieeexplore.ieee.org
Even though malware detection is an active area of research, not many works have used
features extracted from physical properties, such as power consumption. This paper is …

Profiling cpu behavior for detection of android ransomware

R Cabral, JT McDonald, LM Hively… - SoutheastCon …, 2022 - ieeexplore.ieee.org
Android devices continue to dominate the market for global smartphone users, thus making
them an ideal target for malicious software developers. In the past, side-channel attacks …

Detection of potentially compromised computer nodes and clusters connected on a smart grid, using power consumption data

M Almshari, G Tsaramirsis, AO Khadidos, SM Buhari… - Sensors, 2020 - mdpi.com
Monitoring what application or type of applications running on a computer or a cluster
without violating the privacy of the users can be challenging, especially when we may not …

ULTRA: Ultimate rootkit detection over the air

DP Pham, D Marion, A Heuser - … of the 25th International Symposium on …, 2022 - dl.acm.org
Rootkits are the most challenging malware threats against server and desktop systems.
They are created by highly skilled actors and are deployed in advanced persistent threat …

SoK Paper: Power Side-Channel Malware Detection

A Cathis, G Li, S Wei, M Orshansky, M Tiwari… - Proceedings of the …, 2024 - dl.acm.org
Analyzing power consumption has been proposed as an effective way to detect anomalous
system behavior. The power side channel provides a non-intrusive and not easily …

An anomaly detecting blockchain strategy for secure IoT networks

N Alsadi, W Hilal, O Surucu, A Giuliani… - Disruptive …, 2022 - spiedigitallibrary.org
Highly distributed connected systems, such as the Internet of Things (IoT), have made their
way across numerous fields of application. IoT systems present a method for the connection …

VR Headset Ransomware Attack Vulnerability

MZ Tahat, WB Glisson… - 2024 IEEE Canadian …, 2024 - ieeexplore.ieee.org
Virtual Reality (VR) Head Mounted Displays (HMD), also called VR headsets, are breaching
barriers that previously held back widespread adoption and usage. The escalation in usage …

Phase space power analysis for PC-based rootkit detection

JT McDonald, RC Clark, LM Hively… - Proceedings of the 2022 …, 2022 - dl.acm.org
Within the current threat landscape of cyberattacks, adversaries use a wide array of
techniques to gain a persistent and covert presence on systems. Rootkits are a popular form …

A malware obfuscation AI technique to evade antivirus detection in counter forensic domain

A A. Mawgoud, HM Rady, BS Tawfik - Enabling AI applications in data …, 2021 - Springer
Data obfuscation is the process of converting a constant or a variable into computational
results of several constants to make it hard for the files to be detected or analyzed by anti …