Machine learning-based android malware detection using manifest permissions
The Android operating system is currently the most prevalent mobile device operating
system holding roughly 54 percent of the total global market share. Due to Android's …
system holding roughly 54 percent of the total global market share. Due to Android's …
Malware detection using power consumption and network traffic data
JH Jimenez… - 2019 2nd International …, 2019 - ieeexplore.ieee.org
Even though malware detection is an active area of research, not many works have used
features extracted from physical properties, such as power consumption. This paper is …
features extracted from physical properties, such as power consumption. This paper is …
Profiling cpu behavior for detection of android ransomware
R Cabral, JT McDonald, LM Hively… - SoutheastCon …, 2022 - ieeexplore.ieee.org
Android devices continue to dominate the market for global smartphone users, thus making
them an ideal target for malicious software developers. In the past, side-channel attacks …
them an ideal target for malicious software developers. In the past, side-channel attacks …
Detection of potentially compromised computer nodes and clusters connected on a smart grid, using power consumption data
Monitoring what application or type of applications running on a computer or a cluster
without violating the privacy of the users can be challenging, especially when we may not …
without violating the privacy of the users can be challenging, especially when we may not …
ULTRA: Ultimate rootkit detection over the air
Rootkits are the most challenging malware threats against server and desktop systems.
They are created by highly skilled actors and are deployed in advanced persistent threat …
They are created by highly skilled actors and are deployed in advanced persistent threat …
SoK Paper: Power Side-Channel Malware Detection
Analyzing power consumption has been proposed as an effective way to detect anomalous
system behavior. The power side channel provides a non-intrusive and not easily …
system behavior. The power side channel provides a non-intrusive and not easily …
An anomaly detecting blockchain strategy for secure IoT networks
Highly distributed connected systems, such as the Internet of Things (IoT), have made their
way across numerous fields of application. IoT systems present a method for the connection …
way across numerous fields of application. IoT systems present a method for the connection …
VR Headset Ransomware Attack Vulnerability
MZ Tahat, WB Glisson… - 2024 IEEE Canadian …, 2024 - ieeexplore.ieee.org
Virtual Reality (VR) Head Mounted Displays (HMD), also called VR headsets, are breaching
barriers that previously held back widespread adoption and usage. The escalation in usage …
barriers that previously held back widespread adoption and usage. The escalation in usage …
Phase space power analysis for PC-based rootkit detection
JT McDonald, RC Clark, LM Hively… - Proceedings of the 2022 …, 2022 - dl.acm.org
Within the current threat landscape of cyberattacks, adversaries use a wide array of
techniques to gain a persistent and covert presence on systems. Rootkits are a popular form …
techniques to gain a persistent and covert presence on systems. Rootkits are a popular form …
A malware obfuscation AI technique to evade antivirus detection in counter forensic domain
A A. Mawgoud, HM Rady, BS Tawfik - Enabling AI applications in data …, 2021 - Springer
Data obfuscation is the process of converting a constant or a variable into computational
results of several constants to make it hard for the files to be detected or analyzed by anti …
results of several constants to make it hard for the files to be detected or analyzed by anti …