A Survey of strategy-driven evasion methods for PE malware: transformation, concealment, and attack
The continuous proliferation of malware poses a formidable threat to the cyberspace
landscape. Researchers have proffered a multitude of sophisticated defense mechanisms …
landscape. Researchers have proffered a multitude of sophisticated defense mechanisms …
CloudEyes: Cloud‐based malware detection with reversible sketch for resource‐constrained internet of things (IoT) devices
Because of the rapid increasing of malware attacks on the Internet of Things in recent years,
it is critical for resource‐constrained devices to guard against potential risks. The traditional …
it is critical for resource‐constrained devices to guard against potential risks. The traditional …
Antiviruses under the microscope: A hands-on perspective
AntiViruses (AVs) are the main defense line against attacks for most users and much
research has been done about them, especially proposing new detection procedures that …
research has been done about them, especially proposing new detection procedures that …
A three-level ransomware detection and prevention mechanism
A Ren, C Liang, I Hyug, S Broh, NZ Jhanjhi - EAI Endorsed Transactions on …, 2020 - eudl.eu
Ransomware encrypts victim's files or locks users out of the system. Victims will have to pay
the attacker a ransom to decrypt and regain access to the user files. Petya targets individuals …
the attacker a ransom to decrypt and regain access to the user files. Petya targets individuals …
[HTML][HTML] Security challenges when space merges with cyberspace
V Varadharajan, N Suri - Space Policy, 2024 - Elsevier
Abstract Space borne systems, such as communication satellites, sensory, surveillance,
GPS and a multitude of other functionalities, form an integral part of global ICT cyber …
GPS and a multitude of other functionalities, form an integral part of global ICT cyber …
Preempt: Preempting malware by examining embedded processor traces
Anti-virus software (AVS) tools are used to detect Malware in a system. However, software-
based AVS are vulnerable to attacks. A malicious entity can exploit these vulnerabilities to …
based AVS are vulnerable to attacks. A malicious entity can exploit these vulnerabilities to …
Development of a cybersecurity skills index: A scenarios-based, hands-on measure of non-IT professionals' cybersecurity skills
M Carlton - 2016 - search.proquest.com
The main goal of this research study was to develop a scenarios-based, hands-on measure
of non-IT professionals' cybersecurity skills. As opposed to IT professionals, end-users are …
of non-IT professionals' cybersecurity skills. As opposed to IT professionals, end-users are …
Understanding negotiated anti-malware interruption effects on user decision quality in endpoint security
MKS Tan, S Goode, A Richardson - Behaviour & Information …, 2021 - Taylor & Francis
Anti-malware software must be frequently updated in order to protect the system and the
user from attack. Makers of this software must choose between interrupting the user to …
user from attack. Makers of this software must choose between interrupting the user to …
A novel malware for subversion of self‐protection in anti‐virus
B Min, V Varadharajan - Software: Practice and Experience, 2016 - Wiley Online Library
Major anti‐virus solutions have introduced a feature known as 'self‐protection'so that
malware (and even users) cannot modify or disable the core functionality of their products. In …
malware (and even users) cannot modify or disable the core functionality of their products. In …
Feature-distributed malware attack: risk and defence
B Min, V Varadharajan - … -ESORICS 2014: 19th European Symposium on …, 2014 - Springer
Modern computing platforms have progressed to more secure environments with various
defensive techniques such as application-based permission and application whitelisting. In …
defensive techniques such as application-based permission and application whitelisting. In …