Malware is the fastest growing threat to information technology systems. Although a single absolute solution for defeating malware is improbable, a stacked arsenal against malicious software enhances the ability to maintain security and privacy. This research attempts to reinforce the anti-malware arsenal...
"An automated malware detection system for android using behavior-based analysis AMDA." International Journal of Cyber-Security and Digital Forensics (IJCSDF) 2.2 (2013): 1-11.Abela, Kevin Joshua L. et al. (2013). An Automated Malware Detection System for Android using Behavior-based Analysis ...
Mobile malware is rapidly developing, but current anti-virus products in mobile devices still use the signature-based solutions, which usually need a large database and cannot detect malware variants. In this paper, we proposed a behavior-based malware detection system for Windows Mobile platform ca...
Cellphone malware not only causes privacy leakage, extra charges, and depletion of battery power, but also generates malicious traffic and drains down mobile network and service capacity. In this work we devise a novel behavior-based malware detection system named pBMDS, which adopts a ...
Since the malicious behavior is often stable across similar malware instances, behavior-based specifications which capture real malicious characteristics during run time, have become more prevalent in anti-malware tasks, such as malware detection and malware clustering. This kind of specification is ...
Behavior:Win32/FakeUpdates.A Detected by Microsoft Defender Antivirus Aliases:No associated aliases Summary Behavior:Win32/FakeUpdates.A is a behavior-based detection that identifies select, malicious IP addresses used by FakeUpdates. FakeUpdates (also known as SocGholish) is a JavaScript m...
Since deployment, the behavior-based machine learning models have blocked attacker techniques like the following used by attacks in the wild: Credential dumping from LSASS Cross-process injection Process hollowing UAC bypass Tampering with antivirus (such as disablin...
They introduced the concept of blockchain weight and proposed a new fork-resolution principle (FRP), which is not based on the longest chain principle to choose the forks but based on the block weight. The selfish mining attack requires the attacker to reach certain computing power. In the ...
Dofoil uses a customized mining application. Based on its code, the coin miner supports NiceHash, which means it can mine different cryptocurrencies. The samples we analyzed mined Electroneum coins. Persistence For coin miner malware, persistence is key. These...
Behavior:Win32/Qakbot Detected by Microsoft Defender Antivirus Aliases:No associated aliases Summary This is a behavior-based telemetry signature for Qakbot. Read the following blogs for details: Ransomware as a service: Understanding the cybercrime gig economy and how to protect yourself ...