Essays about: "obfuscation detection"

Showing result 1 - 5 of 9 essays containing the words obfuscation detection.

  1. 1. Breaking WebAssembly Crypto Miner Detection by Obfuscation

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Gustav Ekner; [2023]
    Keywords : Computer Security; WebAssembly; Crypto mining; Code Obfuscation; Browsers; Datasäkerhet; WebAssembly; Kryptovalutautvinning; Kodobfuskering; Webbläsare;

    Abstract : Blockchain-based cryptocurrencies is a fairly new concept with a worldwide spread, and there is a massive amount of currencies. Several of them involve so-called currency mining, a feature of Proof-of-Work based blockchains. READ MORE

  2. 2. Detecting PowerShell Obfuscation Techniques using Natural Language Processing

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Jacob Klasmark; [2022]
    Keywords : Obfuscation detection; PowerShell; Natural Language Processing; Machine Learning; Security Operations Center; Obfuskeringsdetektion; PowerShell; Natural Language Processing; Maskinlärning; Security Operations Center;

    Abstract : PowerShell obfuscation is often used to avoid getting detected by Anti Virus programs. There are several different techniques to change a PowerShell script and still perform the same tasks. Detecting these obfuscated files is a good addition in order to detect malicious files. READ MORE

  3. 3. Fast Classification of Obfuscated Malware with an Artificial Neural Network

    University essay from KTH/Datavetenskap

    Author : Johan Luhr; Hannes Hallqvist; [2022]
    Keywords : ;

    Abstract : Malware has posed a problem ever since the first variant was created in the 1980s. As malware detection techniques have advanced, malware developers have in turn found better ways to hide and obfuscate malware. Machine learning (ML) has seen great expansion into many fields over the last years, this includes the field of cybersecurity. READ MORE

  4. 4. Increased evasion resilience in modern PDF malware detectors : Using a more evasive training dataset

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Oscar Ekholm; [2022]
    Keywords : Malware Analysis; Malicious PDF; Malware Detection; Machine Learning; Evasion; Analys av skadlig programvara; Skadlig PDF; Detektion av skadlig programvara; Maskininlärning; Undanflykt;

    Abstract : The large scale usage of the PDF coupled with its versatility has made the format an attractive target for carrying and deploying malware. Traditional antivirus software struggles against new malware and PDF's vast obfuscation options. In the search of better detection systems, machine learning based detectors have been developed. READ MORE

  5. 5. What's the Deal with Stegomalware? : The Techniques, Challenges, Defence and Landscape

    University essay from Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)

    Author : Kristoffer Björklund; [2021]
    Keywords : Stegomalware; steganography; information hiding; covert channel;

    Abstract : Stegomalware is the art of hiding malicious software with steganography. Steganography is the technique of hiding data in a seemingly innocuous carrier. The occurrence of stegomalware is increasing, with attackers using ingenious techniques to avoid detection. READ MORE