Essays about: "Evasion attacks"

Showing result 1 - 5 of 6 essays containing the words Evasion attacks.

  1. 1. Discovering and masking environmental features in modern sandboxes

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Alexander Ljungberg; Simon Smedberg; [2022]
    Keywords : Sandbox; Masking; Anti-VM; Anti-detection; Sandlåda; Maskering; Anti-VM; Antidetektering;

    Abstract : Background. The awareness of cyber attacks in businesses is increasing with the rising number of cyber incidents for businesses. With nearly 350 000 new malware detected per day, there is a big incentive to allocate resources to company infrastructure to mitigate malware. These solutions require scalability not to become bottlenecks and expensive. READ MORE

  2. 2. Increased evasion resilience in modern PDF malware detectors : Using a more evasive training dataset

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Oscar Ekholm; [2022]
    Keywords : Malware Analysis; Malicious PDF; Malware Detection; Machine Learning; Evasion; Analys av skadlig programvara; Skadlig PDF; Detektion av skadlig programvara; Maskininlärning; Undanflykt;

    Abstract : The large scale usage of the PDF coupled with its versatility has made the format an attractive target for carrying and deploying malware. Traditional antivirus software struggles against new malware and PDF's vast obfuscation options. In the search of better detection systems, machine learning based detectors have been developed. READ MORE

  3. 3. Evasion Attacks Against Behavioral Biometric Continuous Authentication Using a Generative Adversarial Network

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Herman Blenneros; Erik Sävenäs; [2021]
    Keywords : Continuous Authentication; Generative Adversarial Network; evasion; biometrics;

    Abstract : The aim of the project was to examine the feasibilityof evading continuous authentication systems with a generativeadversarial network. To this end, a group of supervised andunsupervised state-of-the-art classifiers were trained on a publiclyavailable dataset of stroke patterns on mobile devices. READ MORE

  4. 4. Towards Extending Probabilistic Attack Graphs with Forensic Evidence : An investigation of property list files in macOS

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Olle Hovmark; Emma Schüldt; [2020]
    Keywords : ;

    Abstract : Cyber-attacks against all types of systems is a growing problem in society. Since the Mac operating systems are becoming more common, so are the attacks against them. Probabilistic attack graphs are a way to model cyber- attacks. READ MORE

  5. 5. DNS Traffic Analysis for Network-based Malware Detection

    University essay from KTH/Kommunikationssystem, CoS

    Author : Linh Vu Hong; [2012]
    Keywords : DNS analysis; domain-flux; fast-flux; network-based malware detection; intrusion detection;

    Abstract : Botnets are generally recognized as one of the most challenging threats on the Internet today. Botnets have been involved in many attacks targeting multinational organizations and even nationwide internet services. READ MORE