Essays about: "Analys av skadlig programvara"

Found 5 essays containing the words Analys av skadlig programvara.

  1. 1. Masking revealing hardware attributes in the source code of a hypervisor : A study exploring strategies to hide the identity of virtual environments during malware analysis

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Kevin Engström; Robin Lenz; [2023]
    Keywords : Sandbox detection; analysis evasion; virtual environment; masking;

    Abstract : Background: Malware is responsible for a significant part of the ever increasing cost of cyberattacks. Malware analysis is an important part in minimizing these costs. READ MORE

  2. 2. A command-and-control malware design using cloud covert channels : Revealing elusive covert channels with Microsoft Teams

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Massimo Bertocchi; [2023]
    Keywords : Covert channel; Command and Control; Microsoft Teams; Detection; Hemlig kanal; ledning och kontroll; Microsoft Teams; upptäckt;

    Abstract : With the rise of remote working, business communication platforms such as Microsoft Teams have become indispensable tools deeply ingrained in the workflow of every employee. However, their increasing importance have made the identification and analysis of covert channels a critical concern for both individuals and organizations. READ MORE

  3. 3. Discovering and masking environmental features in modern sandboxes

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Alexander Ljungberg; Simon Smedberg; [2022]
    Keywords : Sandbox; Masking; Anti-VM; Anti-detection; Sandlåda; Maskering; Anti-VM; Antidetektering;

    Abstract : Background. The awareness of cyber attacks in businesses is increasing with the rising number of cyber incidents for businesses. With nearly 350 000 new malware detected per day, there is a big incentive to allocate resources to company infrastructure to mitigate malware. These solutions require scalability not to become bottlenecks and expensive. READ MORE

  4. 4. Increased evasion resilience in modern PDF malware detectors : Using a more evasive training dataset

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Oscar Ekholm; [2022]
    Keywords : Malware Analysis; Malicious PDF; Malware Detection; Machine Learning; Evasion; Analys av skadlig programvara; Skadlig PDF; Detektion av skadlig programvara; Maskininlärning; Undanflykt;

    Abstract : The large scale usage of the PDF coupled with its versatility has made the format an attractive target for carrying and deploying malware. Traditional antivirus software struggles against new malware and PDF's vast obfuscation options. In the search of better detection systems, machine learning based detectors have been developed. READ MORE

  5. 5. Malicious Entity Categorization using Graph modelling

    University essay from KTH/Skolan för informations- och kommunikationsteknik (ICT)

    Author : Gayathri Srinivaasan; [2016]
    Keywords : malware; classification; graph modelling; graph mining; downloader; payload; URL; file sample; graph traversal; malware; klassificering; graf modellering; graf gruvdrift; dataöverföring; nyttolast; URL; fil prov; graf traverse;

    Abstract : Today, malware authors not only write malicious software but also employ obfuscation, polymorphism, packing and endless such evasive techniques to escape detection by Anti-Virus Products (AVP). Besides the individual behavior of malware, the relations that exist among them play an important role for improving malware detection. READ MORE