A survey of adversarial attack and defense methods for malware classification in cyber security
Malware poses a severe threat to cyber security. Attackers use malware to achieve their
malicious purposes, such as unauthorized access, stealing confidential data, blackmailing …
malicious purposes, such as unauthorized access, stealing confidential data, blackmailing …
Tight arms race: Overview of current malware threats and trends in their detection
Cyber attacks are currently blooming, as the attackers reap significant profits from them and
face a limited risk when compared to committing the “classical” crimes. One of the major …
face a limited risk when compared to committing the “classical” crimes. One of the major …
Malware analysis by combining multiple detectors and observation windows
M Ficco - IEEE Transactions on Computers, 2021 - ieeexplore.ieee.org
Malware developers continually attempt to modify the execution pattern of malicious code
hiding it inside apparent normal applications, which makes its detection and classification …
hiding it inside apparent normal applications, which makes its detection and classification …
A malware classification method based on memory dump grayscale image
Y Dai, H Li, Y Qian, X Lu - Digital Investigation, 2018 - Elsevier
Effective analysis of malware is of great significance in guaranteeing the reliability of the
system operation. Malware can easily escape from existing dynamic analysis methods …
system operation. Malware can easily escape from existing dynamic analysis methods …
Eddie: Em-based detection of deviations in program execution
This paper describes EM-Based Detection of Deviations in Program Execution (EDDIE), a
new method for detecting anomalies in program execution, such as malware and other code …
new method for detecting anomalies in program execution, such as malware and other code …
Hardware-assisted detection of firmware attacks in inverter-based cyberphysical microgrids
The electric grid modernization effort relies on the extensive deployment of microgrid (MG)
systems. MGs integrate renewable resources and energy storage systems, allowing to …
systems. MGs integrate renewable resources and energy storage systems, allowing to …
Power-based side-channel instruction-level disassembler
Modern embedded computing devices are vulnerable against malware and software piracy
due to insufficient security scrutiny and the complications of continuous patching. To detect …
due to insufficient security scrutiny and the complications of continuous patching. To detect …
CNN-based malware variants detection method for internet of things
Q Li, J Mi, W Li, J Wang… - IEEE Internet of Things …, 2021 - ieeexplore.ieee.org
Malware has become one of the most serious security threats to the Internet of Things (IoT).
Detection of malware variants can inhibit the spread of malicious code from the traditional …
Detection of malware variants can inhibit the spread of malicious code from the traditional …
RHMD: Evasion-resilient hardware malware detectors
KN Khasawneh, N Abu-Ghazaleh… - Proceedings of the 50th …, 2017 - dl.acm.org
Hardware Malware Detectors (HMDs) have recently been proposed as a defense against
the proliferation of malware. These detectors use low-level features, that can be collected by …
the proliferation of malware. These detectors use low-level features, that can be collected by …
Malware detection in embedded systems using neural network model for electromagnetic side-channel signals
We propose a novel malware detection system for critical embedded and cyber-physical
systems (CPS). The system exploits electromagnetic (EM) side-channel signals from the …
systems (CPS). The system exploits electromagnetic (EM) side-channel signals from the …