Essays about: "stealth malware"
Found 3 essays containing the words stealth malware.
-
1. C&C architecture : Automation of the deployment of a sophisticated infrastructure, for new malicious uses, harder to detect
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Today cybersecurity is becoming a major concern for all of society. Companies can lose billions of dollars because of cyberattacks. States need to keep the vital infrastructure of the country running and must prepare for cyberwar against cyberterrorism and other states. READ MORE
-
2. Classifying evasive malware
University essay from Lunds universitet/Institutionen för elektro- och informationsteknikAbstract : Malware are become increasingly aware of their execution environment. In order to avoid detection by automated analysis solutions and to obstruct manual analysis, malware authors are coming up with new ways for their malware to decide whether it should express its malicious behavior or not. READ MORE
-
3. Security Evaluation of Intel's Active Management Technology
University essay from KTH/Kommunikationssystem, CoSAbstract : Intel’s Active Management Technology (AMT) is, a hardware-based platform for remotely managing and securing personal computers out of band. AMT is available in most desktop and notebooks PCs equipped with an Intel Core 2, Centrino, or Centrino 2 processors with support for vPro technology. READ MORE