Enhancing cyber-resilience for small and medium-sized organizations with prescriptive malware analysis, detection and response

LF Ilca, OP Lucian, TC Balan - Sensors, 2023 - mdpi.com
In this study, the methodology of cyber-resilience in small and medium-sized organizations
(SMEs) is investigated, and a comprehensive solution utilizing prescriptive malware …

Triboelectric sensor-empowered intelligent mouse combined with machine learning technology strides toward a computer security system

W Zhang, M Liu, X Lü, L Deng, X Fan, G Cheng… - Nano Energy, 2024 - Elsevier
The computer mouse is one of the most common tools used for human-machine interfacing.
The human behavior studying by click operation using an intelligent mouse and related …

Volmemlyzer: Volatile memory analyzer for malware classification using feature engineering

AH Lashkari, B Li, TL Carrier… - 2021 Reconciling Data …, 2021 - ieeexplore.ieee.org
Memory forensics is a fundamental step that inspects malicious activities during live
malware infection. Memory analysis not only captures malware footprints but also collects …

SNDMI: Spyware network traffic detection method based on inducement operations

J Peng, C Guo, Y Ping, Y Cui, Y Chen, G Shen - Computers & Security, 2024 - Elsevier
Spyware is a type of malware widely used by attackers to steal confidential information from
users without their knowledge. It has the characteristics of high latency, high stealth, and …

[HTML][HTML] Module extraction and DLL hijacking detection via single or multiple memory dumps

P Fernández-Álvarez, RJ Rodríguez - Forensic Science International …, 2023 - Elsevier
A memory dump contains the current state of a system's physical memory at the time of its
acquisition. Among other things, it contains the processes that were running at the time of …

Responding to targeted stealthy attacks on android using timely-captured memory dumps

J Bellizzi, M Vella, C Colombo… - IEEE Access, 2022 - ieeexplore.ieee.org
The increasing dominance of Android smartphones for everyday communication and data
processing makes long-term stealthy malware an even more dangerous threat. Recent …

CBFISKD: A combinatorial-based fuzzy inference system for keylogger detection

FE Ayo, JB Awotunde, OA Olalekan, AL Imoize, CT Li… - Mathematics, 2023 - mdpi.com
A keylogger is a type of spyware that records keystrokes from the user's keyboard to steal
confidential information. The problems with most keylogger methods are the lack of …

Detection of anti-forensics and malware applications in volatile memory acquisition

C Ratcliffe, BG Bokolo, D Oladimeji, B Zhou - International Conference on …, 2022 - Springer
Malicious software operating on a target system, whether malware or anti-forensic, can
impede data collecting, processing, and testing in digital and cyber forensic research …

VEDRANDO: a novel way to reveal stealthy attack steps on android through memory forensics

J Bellizzi, E Losiouk, M Conti, C Colombo… - Journal of Cybersecurity …, 2023 - mdpi.com
The ubiquity of Android smartphones makes them targets of sophisticated malware, which
maintain long-term stealth, particularly by offloading attack steps to benign apps. Such …

Responding to living-off-the-land tactics using just-in-time memory forensics (JIT-MF) for android

J Bellizzi, M Vella, C Colombo… - arXiv preprint arXiv …, 2021 - arxiv.org
Digital investigations of stealthy attacks on Android devices pose particular challenges to
incident responders. Whereas consequential late detection demands accurate and …