Essays about: "Evasion attacks"
Showing result 1 - 5 of 6 essays containing the words Evasion attacks.
-
1. Discovering and masking environmental features in modern sandboxes
University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskapAbstract : Background. The awareness of cyber attacks in businesses is increasing with the rising number of cyber incidents for businesses. With nearly 350 000 new malware detected per day, there is a big incentive to allocate resources to company infrastructure to mitigate malware. These solutions require scalability not to become bottlenecks and expensive. READ MORE
-
2. Increased evasion resilience in modern PDF malware detectors : Using a more evasive training dataset
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : The large scale usage of the PDF coupled with its versatility has made the format an attractive target for carrying and deploying malware. Traditional antivirus software struggles against new malware and PDF's vast obfuscation options. In the search of better detection systems, machine learning based detectors have been developed. READ MORE
-
3. Evasion Attacks Against Behavioral Biometric Continuous Authentication Using a Generative Adversarial Network
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : The aim of the project was to examine the feasibilityof evading continuous authentication systems with a generativeadversarial network. To this end, a group of supervised andunsupervised state-of-the-art classifiers were trained on a publiclyavailable dataset of stroke patterns on mobile devices. READ MORE
-
4. Towards Extending Probabilistic Attack Graphs with Forensic Evidence : An investigation of property list files in macOS
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Cyber-attacks against all types of systems is a growing problem in society. Since the Mac operating systems are becoming more common, so are the attacks against them. Probabilistic attack graphs are a way to model cyber- attacks. READ MORE
-
5. DNS Traffic Analysis for Network-based Malware Detection
University essay from KTH/Kommunikationssystem, CoSAbstract : Botnets are generally recognized as one of the most challenging threats on the Internet today. Botnets have been involved in many attacks targeting multinational organizations and even nationwide internet services. READ MORE