5 Hits in 4.0 sec

File Packing from the Malware Perspective: Techniques, Analysis Approaches, and Directions for Enhancements

Trivikram Muralidharan, Aviad Cohen, Noa Gerson, Nir Nissim
2022 ACM Computing Surveys  
With the growing sophistication of malware, the need to devise improved malware detection schemes is crucial.  ...  This paper provides statistics on the use of packers based on an extensive analysis of 24,000 PE files (both malicious and benign files) for the past 10 years, which allowed us to observe trends in packing  ...  ACKNOWLEDGEMENTS We would like to thank Shlomi Boutnaru for his meaningful discussions regarding packing techniques and how they are being exploited by malware authors.  ... 
doi:10.1145/3530810 fatcat:c6horhx3i5bevk5ibtu5y42rim

iVisher: Real-Time Detection of Caller ID Spoofing

Jaeseung Song, Hyoungshick Kim, Athanasios Gkelias
2014 ETRI Journal  
We propose a system named iVisher for detecting a concealed incoming number (that is, caller ID) in Session Initiation Protocol-based Voice-over-Internet Protocol initiated phone calls.  ...  Our results demonstrate that iVisher is capable of detecting a concealed caller ID without significantly impacting upon the overall call setup time.  ...  Future work is envisioned to extend the system to detect other attacks (for example, spam messages) in VoIP networks.  ... 
doi:10.4218/etrij.14.0113.0798 fatcat:lhwk3led3benjnid2qzbtbsmim

Quality improvement of labels for model-driven benchmark data generation for intrusion detection systems

Maximilian Frank, Andreas Rauber
Intrusion Detection Systems, using various algorithms and techniques to detect malicious activities on systems or computer networks, are therefore commonly used by cyber security personnel to counteract  ...  Quality of the generated labeled datasets was also verified through an expert survey.  ...  Signature-based Detection.  ... 
doi:10.34726/hss.2021.82646 fatcat:66k7w4f3xvdjblczx5ygl5bjve

Improving Defect Prediction Models by Combining Classifiers Predicting Different Defects [article]

Jean Petric, UH Research Archive
Only a few highly diverse and accurate base models are needed to compose an effective ensemble.  ...  An additional, non-published work, presents a visual technique for the analysis of predictions made by individual classifiers and discusses some possible constraints for classifiers used in software defect  ...  Learning to rank approaches, which are regression-based, are an alternative to the classification system. In a learning to rank approach, the information about the number of defects is kept.  ... 
doi:10.18745/th.23943 fatcat:yddpvdlzvnejvjjyy32b3rc3jm

"I wonder how, I wonder why": Supporting users in protecting their digital privacy by increasing risk awareness and knowledge as well as addressing protection obstacles

Nina Gerber
appropriate study design based on the sizes of the considered effects.  ...  people's attitude and behavior in the privacy context: Although people often express concerns about their privacy, they rarely take measures to protect their private data and frequently provide private information  ...  (β) Number of applications (NoA) Information disclosure (general) -0.35*** Benefits -entertainment (BEN- Usage of a location sharing applica- 0.32*** E) tion Basic Information Disclosure Teen information  ... 
doi:10.25534/tuprints-00011554 fatcat:jfdpmnzqlnaavo5bl5yajkb43i