Figure 1 - uploaded by Felix Hill
Content may be subject to copyright.
Source publication
Malware is a growing threat to modern computers, so that today, every system must
protect itself with additional security software. This broad use of protection systems
leads to a considerable number of malware samples which have to be analyzed on
a daily basis and therefore, automated malware classification systems which can be
used in practice ar...
Similar publications
Application Programming Interfaces (APIs) are still considered the
standard accessible data source and core wok of the most widely
adopted malware detection and classification techniques. API-based
malware detectors highly rely on measuring API’s statistical features, such as calculating the frequency counter of calling specific
API calls or findin...
The Internet of Things (IoT) is prone to malware assaults due to its simple installation and autonomous operating qualities. IoT devices have become the most tempting targets of malware due to well-known vulnerabilities such as weak, guessable, or hard-coded passwords, a lack of secure update procedures, and unsecured network connections. Tradition...
Android malware detection is a significant problem that affects billions of users using millions of Android applications (apps) in existing markets. Thiss paper proposes PetaDroid, a framework for accurate Android malware detection and family clustering on top of static analyses. PetaDroid automatically adapts to Android malware and benign changes...
Rapid digital infrastructure growth has advanced several sectors in today's interconnected society. Digital change increases vulnerabilities, especially in cybersecurity. Ransomware is a unique cyber danger because thieves' profit from it. Ransomware targets victims by encrypting their data and demanding money to decrypt it. Such attacks can cause...
With the rapid increase in the number of Android malware, the image-based analysis method has become an effective way to defend against symmetric encryption and confusing malware. At present, the existing Android malware bytecode image detection method, based on a convolution neural network (CNN), relies on a single DEX file feature and requires a...