Essays about: "malware behavior"
Showing result 1 - 5 of 13 essays containing the words malware behavior.
-
1. Students’ Perception of Cyber Threat Severity : Investigating Alignment with Actual Risk Levels
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : This study aims to investigate the alignment between students’ perception of cyber threats and their actual risk levels. A mixed-method approach was used, where data was collected from Swedish university students through questionnaires, capturing their perception, familiarity, experience, and protective behaviors. READ MORE
-
2. Increased evasion resilience in modern PDF malware detectors : Using a more evasive training dataset
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : The large scale usage of the PDF coupled with its versatility has made the format an attractive target for carrying and deploying malware. Traditional antivirus software struggles against new malware and PDF's vast obfuscation options. In the search of better detection systems, machine learning based detectors have been developed. READ MORE
-
3. Comparing state-of-the-art machine learning malware detection methods on Windows
University essay fromAbstract : Background. Malware has been a major issue for years and old signature scanning methods for detecting malware are outdated and can be bypassed by most advanced malware. With the help of machine learning, patterns of malware behavior and structure can be learned to detect the more advanced threats that are active today. Objectives. READ MORE
-
4. The Development and Effectiveness of Malware Vaccination : An Experiment
University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskapAbstract : Background. The main problem that our master thesis is trying to reduce is malware infection. One method that can be used to accomplish this goal is based on the fact that most malware does not want to get caught by security programs and are actively trying to avoid them. READ MORE
-
5. Studying the effectiveness of dynamic analysis for fingerprinting Android malware behavior
University essay from Linköpings universitet/Databas och informationsteknikAbstract : Android is the second most targeted operating system for malware authors and to counter the development of Android malware, more knowledge about their behavior is needed. There are mainly two approaches to analyze Android malware, namely static and dynamic analysis. READ MORE