80 Hits in 7.4 sec


Federico Maggi, Andrea Valdi, Stefano Zanero
2013 Proceedings of the Third ACM workshop on Security and privacy in smartphones & mobile devices - SPSM '13  
Although there are controversial opinions regarding how large the mobile malware phenomenon is in terms of absolute numbers, hype aside, the amount of new Android malware variants is increasing.  ...  We present AndroTotal, a publicly available tool, malware repository and research framework that aims at mitigating the above challenges, and allow researchers to automatically scan Android apps against  ...  This of course creates a market for security products on the Android platform.  ... 
doi:10.1145/2516760.2516768 dblp:conf/ccs/MaggiVZ13 fatcat:3aiuw24pf5frxlvcdf2itqefjq

AndRadar: Fast Discovery of Android Applications in Alternative Markets [chapter]

Martina Lindorfer, Stamatis Volanis, Alessandro Sisto, Matthias Neugschwandtner, Elias Athanasopoulos, Federico Maggi, Christian Platzer, Stefano Zanero, Sotiris Ioannidis
2014 Lecture Notes in Computer Science  
This complicates the task of detecting and tracking Android malware.  ...  Other mobile platforms, such as Apple iOS and BlackBerry OS also use the marketplace model, but what is unique to Android is the existence of a plethora of alternative application markets.  ...  [29] conducted a large-scale measurement on 194 alternative Android markets (of which a list was not disclosed, to the best of our knowledge) in October 2011, collecting 41,057 applications.  ... 
doi:10.1007/978-3-319-08509-8_4 fatcat:54uaf3s7wjdsblj5yatvi4mzke

A Survey of App Store Analysis for Software Engineering

William Martin, Federica Sarro, Yue Jia, Yuanyuan Zhang, Mark Harman
2017 IEEE Transactions on Software Engineering  
Findings from App Store Analysis have a direct and actionable impact on the software teams that develop software for app stores, and have led to techniques for requirements engineering, release planning  ...  App stores provide a wealth of information derived from users that would not exist had the applications been distributed via previous software deployment methods.  ...  ACKNOWLEDGMENTS We thank the anonymous reviewers for their very helpful feedback, and our many colleagues who responded with their valuable comments on an earlier version of this survey.  ... 
doi:10.1109/tse.2016.2630689 fatcat:tuqtkqnzordklgq2thihhc6sxy

The Role of Cloud Services in Malicious Software: Trends and Insights [chapter]

Xiao Han, Nizar Kheir, Davide Balzarotti
2015 Lecture Notes in Computer Science  
We conduct a large scale analysis of all the malware samples submitted to the Anubis malware analysis system between 2008 and 2014.  ...  Our results reveal that cybercriminals sustain long-lived operations through the use of public cloud resources, either as a redundant or a major component of their malware infrastructures.  ...  This research was partly funded by the French Ministry of education and research under Cifre grant given to Xiao Han, and by the European Unions Horizon 2020 project SUPERCLOUD under grant agreement 643964  ... 
doi:10.1007/978-3-319-20550-2_10 fatcat:ac2x23ccavfdfmyikl4pfgcwqq

Usage of Artificial Intelligence to Improve Secure Software Development

Ahmet EFE
2021 Journal of International Scientific Researches  
C# is an object-oriented software language that was developed by Microsoft and runs on the .NET framework. It has the ninth in Github, and it would cause a great impact in .NET.  ...  As part of a limited literature review study, we have analyzed 3 main articles in detail.  ...  large scale study (Lindorfer, 2014) , unless they are complemented by some form of dynamic analysis, as recently proposed in StaDynA (Zhauniarovich, 2015) .  ... 
doi:10.23834/isrjournal.824662 fatcat:dcohk43h2rd7jg5olkzbmko7ku

Dissecting Android Cryptocurrency Miners [article]

Stanislav Dashevskyi, Yury Zhauniarovich, Olga Gadyatskaya, Aleksandr Pilgun, Hamza Ouhssain
2019 arXiv   pre-print
In this work, we make a step towards combating this threat. We collected and manually verified a large dataset of Android mining apps.  ...  We analyzed the collected miners and identified how they work, what are the most popular libraries and APIs used to facilitate their development, and what static features are typical for this class of  ...  There exist a large body of work that focuses on Android malware detection, e.g., [19, 2, 14, 42, 39, 41, 45, 36] , to name just a few.  ... 
arXiv:1905.02602v2 fatcat:u2jj2sq35vaqdhevqbu5bxlgoe

The Dark Side(-Channel) of Mobile Devices: A Survey on Network Traffic Analysis [article]

Mauro Conti, QianQian Li, Alberto Maragno, Riccardo Spolaor
2018 arXiv   pre-print
We also discuss possible countermeasures, challenges and possible directions for future research on mobile traffic analysis and other emerging domains (e.g., Internet of Things).  ...  (iii) the targeted mobile platforms.  ...  [62] ACKNOWLEDGMENT Mauro Conti is supported by a Marie Curie Fellowship funded by the European Commission (agreement PCIG11-GA-2012-321980). This work is partially supported by the EU Tag  ... 
arXiv:1708.03766v3 fatcat:ss6hqa7zsjcavkkwexftpowtku

A Large-Scale Analysis of the Security of Embedded Firmwares

Andrei Costin, Jonas Zaddach, Aurélien Francillon, Davide Balzarotti
2014 USENIX Security Symposium  
In this paper we present the first public, large-scale analysis of firmware images.  ...  We leverage this large-scale analysis to bring new insights on the security of embedded devices and to underline and detail several important challenges that need to be addressed in future research.  ...  In particular we thank our shepherd, Cynthia Sturton, for her valuable time and inputs guiding this paper for publication.  ... 
dblp:conf/uss/CostinZFB14 fatcat:2hmiegyeibab7j2kaq5wlm4shy

To Catch a Ratter: Monitoring the Behavior of Amateur DarkComet RAT Operators in the Wild

Brown Farinholt, Mohammad Rezaeirad, Paul Pearce, Hitesh Dharmdasani, Haikuo Yin, Stevens Le Blond, Damon McCoy, Kirill Levchenko
2017 2017 IEEE Symposium on Security and Privacy (SP)  
To our knowledge, we are the first large-scale systematic study of RAT use.  ...  In this work we study the use of DarkComet, a popular commercial RAT.  ...  We developed a technique to scan for DarkComet operators active on the Internet.  ... 
doi:10.1109/sp.2017.48 dblp:conf/sp/FarinholtRPDYBM17 fatcat:gfztgkoejzbshi3xlbxom324oi

2021 Index IEEE Transactions on Big Data Vol. 7

2022 IEEE Transactions on Big Data  
The primary entry includes the coauthors' names, the title of the paper or other item, and its location, specified by the publication abbreviation, year, month, and inclusive pagination.  ...  The Subject Index contains entries describing the item under all appropriate subject headings, plus the first author's name, the publication abbreviation, month, and year, and inclusive pages.  ...  ., +, TBData Oct. 2021 796-807 Computer crime A Large-Scale Study of Android Malware Development Phenomenon on Public Malware Submission and Scanning Platform.  ... 
doi:10.1109/tbdata.2021.3137062 fatcat:czv5veuqtjex7alnqcuyjoxbma

On the Security of Application Installers and Online Software Repositories [chapter]

Marcus Botacin, Giovanni Bertão, Paulo de Geus, André Grégio, Christopher Kruegel, Giovanni Vigna
2020 Lecture Notes in Computer Science  
Online public repositories have been one of the most popular ways for end users to obtain software, but there is a lack of systematic security evaluation of popular public repositories.  ...  We focus on their software updating dynamics, as well as the presence of traces of vulnerable and/or trojanized applications among the top-100 most downloaded Windows programs on each of the evaluated  ...  The closest work to ours are related to the investigation of the application installation logs on the Android platform [23] and the detection of piracy signs on application installers [21] .  ... 
doi:10.1007/978-3-030-52683-2_10 fatcat:cwz4ck5aozaipkbz6hmdqhoxh4

Anatomy of Threats to The Internet of Things

Imran Makhdoom, Mehran Abolhasan, Justin Lipman, Ren Ping Liu, Wei Ni
2018 IEEE Communications Surveys and Tutorials  
We present a detailed attack methodology adopted by some of the most successful malware attacks on IoT including ICS and CPS.  ...  In the end, we propose a composite guideline for the development of an IoT security framework based on industry best practices and also highlight lessons learned, pitfalls and the open research challenges  ...  A. Anatomy of Malware Different types of malware are developed to achieve diverse objectives.  ... 
doi:10.1109/comst.2018.2874978 fatcat:5qkflaozurb4nctkfrwswnbce4

A Survey on Honeypot Software and Data Analysis [article]

Marcin Nawrocki, Matthias Wählisch, Thomas C. Schmidt, Christian Keil, Jochen Schönfelder
2016 arXiv   pre-print
In this survey, we give an extensive overview on honeypots. This includes not only honeypot software but also methodologies to analyse honeypot data.  ...  They use a deviation value β to detect large-scale and unusual events. β > 10 indicates botnet-waves and fast-scanning worms, β > 3 slow-scanning worms. β pi = mp i / i−1 j=0 p j (36) where p i denotes  ...  One of the very first large-scale worldwide honeypot projects was launched by the Institut Eurocom in 2003 and is called the project.  ... 
arXiv:1608.06249v1 fatcat:nlv2qdnmmvhxlmsfkyszl3owxq

A Survey on Botnets: Incentives, Evolution, Detection and Current Trends

Simon Nam Thanh Vu, Mads Stege, Peter Issam El-Habr, Jesper Bang, Nicola Dragoni
2021 Future Internet  
Botnets have shown a capacity to perform substantial damage through distributed denial-of-service attacks, information theft, spam and malware propagation.  ...  In this paper, a systematic literature review on botnets is presented to the reader in order to obtain an understanding of the incentives, evolution, detection, mitigation and current trends within the  ...  However, both papers do not include more recent studies and publications (all are pre-2014).  ... 
doi:10.3390/fi13080198 fatcat:5umqenw47ncdxggi4kiotkeag4

Evil Offspring - Ransomware and Crypto Technology

Hilarie Orman
2016 IEEE Internet Computing  
This column focuses on one such phenomenon, which goes by the label "congestion."  ...  The malware on a victim's computer will encrypt the symmetric key using the public key. The public key itself serves as the identifier to use when paying the ransom.  ...  Sidney Fernbach, one of the pioneers on the development and application of high performance computers for the solution of large computational problems.  ... 
doi:10.1109/mic.2016.90 fatcat:v5zmzx7qrba5dkqxweoo3ifvry
« Previous Showing results 1 — 15 out of 80 results