Enhancing cyber-resilience for small and medium-sized organizations with prescriptive malware analysis, detection and response
In this study, the methodology of cyber-resilience in small and medium-sized organizations
(SMEs) is investigated, and a comprehensive solution utilizing prescriptive malware …
(SMEs) is investigated, and a comprehensive solution utilizing prescriptive malware …
Triboelectric sensor-empowered intelligent mouse combined with machine learning technology strides toward a computer security system
W Zhang, M Liu, X Lü, L Deng, X Fan, G Cheng… - Nano Energy, 2024 - Elsevier
The computer mouse is one of the most common tools used for human-machine interfacing.
The human behavior studying by click operation using an intelligent mouse and related …
The human behavior studying by click operation using an intelligent mouse and related …
Volmemlyzer: Volatile memory analyzer for malware classification using feature engineering
AH Lashkari, B Li, TL Carrier… - 2021 Reconciling Data …, 2021 - ieeexplore.ieee.org
Memory forensics is a fundamental step that inspects malicious activities during live
malware infection. Memory analysis not only captures malware footprints but also collects …
malware infection. Memory analysis not only captures malware footprints but also collects …
SNDMI: Spyware network traffic detection method based on inducement operations
Spyware is a type of malware widely used by attackers to steal confidential information from
users without their knowledge. It has the characteristics of high latency, high stealth, and …
users without their knowledge. It has the characteristics of high latency, high stealth, and …
[HTML][HTML] Module extraction and DLL hijacking detection via single or multiple memory dumps
P Fernández-Álvarez, RJ Rodríguez - Forensic Science International …, 2023 - Elsevier
A memory dump contains the current state of a system's physical memory at the time of its
acquisition. Among other things, it contains the processes that were running at the time of …
acquisition. Among other things, it contains the processes that were running at the time of …
Responding to targeted stealthy attacks on android using timely-captured memory dumps
The increasing dominance of Android smartphones for everyday communication and data
processing makes long-term stealthy malware an even more dangerous threat. Recent …
processing makes long-term stealthy malware an even more dangerous threat. Recent …
CBFISKD: A combinatorial-based fuzzy inference system for keylogger detection
A keylogger is a type of spyware that records keystrokes from the user's keyboard to steal
confidential information. The problems with most keylogger methods are the lack of …
confidential information. The problems with most keylogger methods are the lack of …
Detection of anti-forensics and malware applications in volatile memory acquisition
Malicious software operating on a target system, whether malware or anti-forensic, can
impede data collecting, processing, and testing in digital and cyber forensic research …
impede data collecting, processing, and testing in digital and cyber forensic research …
VEDRANDO: a novel way to reveal stealthy attack steps on android through memory forensics
The ubiquity of Android smartphones makes them targets of sophisticated malware, which
maintain long-term stealth, particularly by offloading attack steps to benign apps. Such …
maintain long-term stealth, particularly by offloading attack steps to benign apps. Such …
Responding to living-off-the-land tactics using just-in-time memory forensics (JIT-MF) for android
Digital investigations of stealthy attacks on Android devices pose particular challenges to
incident responders. Whereas consequential late detection demands accurate and …
incident responders. Whereas consequential late detection demands accurate and …