Essays about: "Analys av skadlig programvara"
Found 5 essays containing the words Analys av skadlig programvara.
-
1. Masking revealing hardware attributes in the source code of a hypervisor : A study exploring strategies to hide the identity of virtual environments during malware analysis
University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskapAbstract : Background: Malware is responsible for a significant part of the ever increasing cost of cyberattacks. Malware analysis is an important part in minimizing these costs. READ MORE
-
2. A command-and-control malware design using cloud covert channels : Revealing elusive covert channels with Microsoft Teams
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : With the rise of remote working, business communication platforms such as Microsoft Teams have become indispensable tools deeply ingrained in the workflow of every employee. However, their increasing importance have made the identification and analysis of covert channels a critical concern for both individuals and organizations. READ MORE
-
3. Discovering and masking environmental features in modern sandboxes
University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskapAbstract : Background. The awareness of cyber attacks in businesses is increasing with the rising number of cyber incidents for businesses. With nearly 350 000 new malware detected per day, there is a big incentive to allocate resources to company infrastructure to mitigate malware. These solutions require scalability not to become bottlenecks and expensive. READ MORE
-
4. Increased evasion resilience in modern PDF malware detectors : Using a more evasive training dataset
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : The large scale usage of the PDF coupled with its versatility has made the format an attractive target for carrying and deploying malware. Traditional antivirus software struggles against new malware and PDF's vast obfuscation options. In the search of better detection systems, machine learning based detectors have been developed. READ MORE
-
5. Malicious Entity Categorization using Graph modelling
University essay from KTH/Skolan för informations- och kommunikationsteknik (ICT)Abstract : Today, malware authors not only write malicious software but also employ obfuscation, polymorphism, packing and endless such evasive techniques to escape detection by Anti-Virus Products (AVP). Besides the individual behavior of malware, the relations that exist among them play an important role for improving malware detection. READ MORE