63 Hits in 8.8 sec

A Situation Analysis on Cybercrime and its Economic Impact in Nigeria

Muhammad Ubale, Sulaiman Isyaku
2017 International Journal of Computer Applications  
Based on that, this paper has covered a range of contemporary cyber threats and attacks that are crippling Nigeria's financial institutes and other agencies whose services rely on the internet platform  ...  The attackers use malicious codes to cause anomalies within the functional levels of the software.  ...  Interruption of service A major DoS or DDoS attack could cause a massive breakdown of an entire infrastructure.  ... 
doi:10.5120/ijca2017914788 fatcat:k5esu3f3cfd3bmyxir4m4cvnxm

Tight Arms Race: Overview of Current Malware Threats and Trends in Their Detection

Luca Caviglione, Michal Choras, Igino Corona, Artur Janicki, Wojciech Mazurczyk, Marek Pawlicki, Katarzyna Wasielewska
2020 IEEE Access  
That is why, in this paper we first perform a detailed meta-review of the existing surveys related to malware and its detection techniques, showing an arms race between these two sides of a barricade.  ...  One of the major components that leads to the successful compromising of the targeted system is malicious software.  ...  , or even offer their ''services'' using the Crime-as-a-Service (CaaS) business model.  ... 
doi:10.1109/access.2020.3048319 fatcat:tatdk6pzczgp3aylvbxoxabuta

Supporting Transparent Snapshot for Bare-metal Malware Analysis on Mobile Devices

Le Guan, Shijie Jia, Bo Chen, Fengwei Zhang, Bo Luo, Jingqiang Lin, Peng Liu, Xinyu Xing, Luning Xia
2017 Proceedings of the 33rd Annual Computer Security Applications Conference on - ACSAC 2017  
The increasing growth of cybercrimes targeting mobile devices urges an efficient malware analysis platform.  ...  Existing works mainly focus on extracting the malicious behaviors exposed during bare-metal analysis.  ...  INTRODUCTION Smartphones are increasingly becoming the targets of cybercrimes.  ... 
doi:10.1145/3134600.3134647 dblp:conf/acsac/GuanJCZLLLXX17 fatcat:6sgozgloofbwvkqzawixtlkxma

A survey on android security: development and deployment hindrance and best practices

Ratul Sikder, Md Shohel Khan, Md Shohrab Hossain, Wazir Zada Khan
2020 TELKOMNIKA (Telecommunication Computing Electronics and Control)  
We also discussed the historical development of Android OS and the end-users role to maintain privacy and to minimize security risks. This is an open access article under the CC BY-SA license.  ...  has been introduced frequently as well.  ...  The top security threats are discussed in the following: Malicious app Malicious apps are specially designed to attack smartphone systems.  ... 
doi:10.12928/telkomnika.v18i1.13288 fatcat:ee6umxstcfe4tannpnrqia6qli

A Lightweight Anti-Phishing Technique for Mobile Phone

Abdul Abiodun Orunsolu, Misturah Adunni Alaran, Adeleke Amos Adebayo, Sakiru Oluyemi Kareem, Ayobami Oke
2017 Acta Informatica Pragensia  
However, the adoption of mobile phones for online activities is now being challenged by myriads of cybercrimes. One of such crimes is phishing attack.  ...  Mobile phones have become an essential device for accessing the web. This is due to the advantages of portability, lower cost and ease.  ...  an android detector module.  ... 
doi:10.18267/j.aip.104 fatcat:if3zyp4ogrdqthediajpgwmcky

SMS-Based Mobile Botnet Detection Framework Using Intelligent Agents

Abdullah J. Alzahrani, Ali A. Ghorbani
2017 Journal of Cyber Security and Mobility  
Short Message Service (SMS) has been increasingly targeted by a number of malicious applications ("apps") that have the ability to abuse SMS features in order to send spam, to transfer command and control  ...  Along with increasing security measures in Android platforms, the amount of Android malware that use remote exploits has grown significantly.  ...  SMS-Based Botnet SMS-based mobile botnet has become an evident trend in the field of cybercrime forensics, considering that SMS, unlike Internet access, has always been a primary service provided by all  ... 
doi:10.13052/jcsm2245-1439.523 fatcat:dkxeklymibgldpjr5fb6oebo3y

Brain leaks and consumer neurotechnology

Marcello Ienca, Pim Haselager, Ezekiel J Emanuel
2018 Nature Biotechnology  
By creating malicious audio or video files, attackers could entice a user to preview a song or video on an unpatched Android device.  ...  As real life and online become indistinguishable from each other, cybercrime has become a part of our daily lives.  ...  Use an Effective Password Policy Ensure that passwords are a mix of letters and numbers, and change them often. Passwords should not consist of words from the dictionary.  ... 
doi:10.1038/nbt.4240 pmid:30188521 fatcat:dwoyvyborfdifdkklju3p3qek4

A Survey on Security for Mobile Devices

Mariantonietta La Polla, Fabio Martinelli, Daniele Sgandurra
2013 IEEE Communications Surveys and Tutorials  
Nowadays, mobile devices are an important part of our everyday lives since they enable us to access a large variety of ubiquitous services.  ...  As the number of vulnerabilities and, hence, of attacks increase, there has been a corresponding rise of security solutions proposed by researchers.  ...  ACKNOWLEDGEMENT The authors would like to thank the anonymous reviewers for their valuable comments and suggestions, which have greatly improved the quality of the paper.  ... 
doi:10.1109/surv.2012.013012.00028 fatcat:us2g2qlglrflporo6fp6vqbdn4

Ransomware Detection Using the Dynamic Analysis and Machine Learning: A Survey and Research Directions

Umara Urooj, Bander Ali Saleh Al-rimy, Anazida Zainal, Fuad A. Ghaleb, Murad A. Rassam
2021 Applied Sciences  
Some of these studies were specifically dedicated to IoT and android platforms.  ...  This study provides an ample list of future directions which will pave the way for future research.  ...  This detection system inspected the malicious behavior at the bytecode level. In [57] , an android based ransomware detection system was presented named as R-PackDroid.  ... 
doi:10.3390/app12010172 fatcat:rcly4o5m5vbc7fczcfstkojklq

Under and over the surface: a comparison of the use of leaked account credentials in the Dark and Surface Web

Dario Adriano Bermudez Villalva, Jeremiah Onaolapo, Gianluca Stringhini, Mirco Musolesi
2018 Crime Science  
For instance, theft of online service credentials is an emerging problem, especially in the Dark Web, where the average price for someone's online identity is £820.  ...  As part of an effort to understand how the same crime unfolds in the Surface Web and the Dark Web, this study seeks to compare the modus operandi of criminals acting on both by leaking Gmail honey accounts  ...  We observed malicious activity taking place on accounts leaked in the Dark Web suggesting an increasing use of this environment as a platform to perform illegal activities, especially as far as the trade  ... 
doi:10.1186/s40163-018-0092-6 fatcat:rvawv5eqcreutahd67robt74bm

Evaluating Criminal Transactional Methods in Cyberspace as Understood in an International Context

R.V. Gundur, Michael Levi, Volkan Topalli, Marie Ouellet, Maria Stolyarova, Lennon Yao-Chung Chang, Diego Domínguez Mejía
2021 CrimRxiv  
Acknowledgements This work was supported by the UK Home Office through a National Cyber Security Programme research grant. Research assistance was provided by Tessa Cole and David Flint.  ...  specialized services responsible for law enforcement in the Member states, as well as specialized bodies of the Union, such as Europol and the European Cybercrime Centre and the European Union Agency for  ...  Gaining Crimeware-as-a-service Crimeware-as-a-service is one of the most advanced types of cybercrime whereby a buyer finds a vendor who arranges and conducts the actual crime.  ... 
doi:10.21428/cb6ab371.5f335e6f fatcat:vmrt7shntreqbg2z5mgysr5anq

Towards a global participatory platform

S. Buckingham Shum, K. Aberer, A. Schmidt, S. Bishop, P. Lukowicz, S. Anderson, Y. Charalabidis, J. Domingue, S. de Freitas, I. Dunwell, B. Edmonds, F. Grey (+8 others)
2012 The European Physical Journal Special Topics  
To democratise such assets as a public good, requires a sustainable ecosystem enabling different kinds of stakeholder in society, including but not limited to, citizens and advocacy groups, school and  ...  We therefore conceive the global participatory platform as a resilient, epistemic ecosystem, whose design will make it capable of selforganization and adaptation to a dynamic environment, and whose structure  ...  can obfuscate as well as illuminate.  ... 
doi:10.1140/epjst/e2012-01690-3 fatcat:eqbwhblv3jeztjragvf4uuhb6i

Security and Communication Network Automatic Analysis Architecture of IoT Malware Samples

Javier Carrillo-Mondejar, Juan Manuel Castelo Gomez, Carlos Núñez-Gómez, Jose Roldán Gómez, José Luis Martínez, Yin Zhang
2020 Security and Communication Networks  
In addition, the proposal is subjected to evaluation, analyzing a testbed of 1500 malware samples, proving that it is an effective approach to rapidly examining malicious software compiled for any architecture  ...  Moreover, in the IoT, coexist multiple hardware architectures, such as ARM, PowerPC, MIPS, Intel 8086, or x64-86, which enlarges even more the quantity of malicious software.  ...  [18] proposed a new approach to differentiate between malicious and benign applications based on a ranking of permissions used in Android IoT devices. eir methodology included an improvement on the  ... 
doi:10.1155/2020/8810708 fatcat:dshu3zh4azbkbgryf3yijkfh6e

I see EK: A lightweight technique to reveal Exploit Kit family by overall URL patterns of infection chains

2019 Turkish Journal of Electrical Engineering and Computer Sciences  
The prevalence and nonstop evolving technical sophistication of exploit kits (EKs) is one of the most challenging shifts in the modern cybercrime landscape.  ...  This practice in use enables the development of an efficient system that is capable of classifying the responsible EK instances.  ...  [8] conducted a study on the emergence of the "Exploit-as-a-Service" model for the drive-by download landscape.  ... 
doi:10.3906/elk-1810-199 fatcat:orf72kdnfbcedmqyxdw3aoe7zu

A Survey on Adversarial Attacks for Malware Analysis [article]

Kshitiz Aryal, Maanak Gupta, Mahmoud Abdelsalam
2022 arXiv   pre-print
Work will provide a taxonomy of adversarial evasion attacks on the basis of attack domain and adversarial generation techniques.  ...  Analyzing the current research challenges in an adversarial generation, the survey will conclude by pinpointing the open future research directions.  ...  Tools used as an oracle for maliciousness verification of adversarial samples, is an open computational challenge along with the selection of appropriate fitness function.  ... 
arXiv:2111.08223v2 fatcat:fiw3pgunsvb2vo7uv72mp6b65a
« Previous Showing results 1 — 15 out of 63 results