Essays about: "stealth malware"

Found 3 essays containing the words stealth malware.

  1. 1. C&C architecture : Automation of the deployment of a sophisticated infrastructure, for new malicious uses, harder to detect

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Timon Glasser; [2021]
    Keywords : Command Control; botnets; RAT; detection; implementation; Red Team; Command Control; botnät; RAT; upptäckt; genomförande; Red Team;

    Abstract : Today cybersecurity is becoming a major concern for all of society. Companies can lose billions of dollars because of cyberattacks. States need to keep the vital infrastructure of the country running and must prepare for cyberwar against cyberterrorism and other states. READ MORE

  2. 2. Classifying evasive malware

    University essay from Lunds universitet/Institutionen för elektro- och informationsteknik

    Author : David Norrestam; Gustaf Ekenstein; [2017]
    Keywords : machine learning; malware; evasive malware; Technology and Engineering;

    Abstract : Malware are become increasingly aware of their execution environment. In order to avoid detection by automated analysis solutions and to obstruct manual analysis, malware authors are coming up with new ways for their malware to decide whether it should express its malicious behavior or not. READ MORE

  3. 3. Security Evaluation of Intel's Active Management Technology

    University essay from KTH/Kommunikationssystem, CoS

    Author : Vassilios Ververis; [2010]
    Keywords : AMT; vPRO; out of band; remote management; backdoor; stealth malware; security;

    Abstract : Intel’s Active Management Technology (AMT) is, a hardware-based platform for remotely managing and securing personal computers out of band. AMT is available in most desktop and notebooks PCs equipped with an Intel Core 2, Centrino, or Centrino 2 processors with support for vPro technology. READ MORE