Essays about: "malware"

Showing result 6 - 10 of 89 essays containing the word malware.

  1. 6. A command-and-control malware design using cloud covert channels : Revealing elusive covert channels with Microsoft Teams

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Massimo Bertocchi; [2023]
    Keywords : Covert channel; Command and Control; Microsoft Teams; Detection; Hemlig kanal; ledning och kontroll; Microsoft Teams; upptäckt;

    Abstract : With the rise of remote working, business communication platforms such as Microsoft Teams have become indispensable tools deeply ingrained in the workflow of every employee. However, their increasing importance have made the identification and analysis of covert channels a critical concern for both individuals and organizations. READ MORE

  2. 7. Assessing Ransomware Mitigation Strategies in Swedish Organizations: A Focus on Phishing Emails

    University essay from Stockholms universitet/Institutionen för data- och systemvetenskap

    Author : Johan Liedgren; Felix von Bonsdorff; [2023]
    Keywords : Ransomware; ransomware mitigation; phishing; phishing emails; malware prevention strategies;

    Abstract : Ransomware has been a growing threat to today's organizations, with irreparable damages and billions of dollars lost, it is crucial for organizations to implement mitigation strategies that can counter these attacks. With phishing attempts being the primary attack vector, it is evident that organizations need to implement the best practices in order to avoid the consequences. READ MORE

  3. 8. Decompiling Go : Using metadata to improve decompilation readability

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Mattias Grenfeldt; [2023]
    Keywords : Decompilation; Go; Runtime Metadata; Reverse Engineering; Dekompilering; Go; Körtidsmetadata; Reverse Engineering;

    Abstract : Malware written in Go is on the rise, and yet, tools for investigating Go programs, such as decompilers, are limited. A decompiler takes a compiled binary and tries to recover its source code. Go is a high-level language that requires runtime metadata to implement many of its features, such as garbage collection and polymorphism. READ MORE

  4. 9. Evaluation of machine learning models for classifying malicious URLs

    University essay from Högskolan i Gävle/Datavetenskap

    Author : Shayan Abad; Hassan Gholamy; [2023]
    Keywords : Machine learning; Cyber security; Classification; Malicious URL; Instance selection;

    Abstract : Millions of new websites are created daily, making it challenging to determine which ones are safe. Cybersecurity involves protecting companies and users from cyberattacks. Cybercriminals exploit various methods, including phishing attacks, to trick users into revealing sensitive information. READ MORE

  5. 10. Edge Computing Security for IoT : A Systematic Literature Review

    University essay from Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)

    Author : Albin Johnsson; Adam Nordling; [2023]
    Keywords : ;

    Abstract : This study conducts a systematic literature review (SLR) to explore the security threats, their mitigation strategies, and the roles of blockchain and 5G technologies in enhancing the security of IoT devices in edge computing environments. Utilizing digital libraries as resources, the review examines three research questions that delve into the common security threats for IoT devices in edge computing, the unique security issues for sensors, gateways, and actuators, and the advantages of integrating blockchain and 5G technologies into edge computing security for IoT systems. READ MORE