Saha et al., 2024 - Google Patents
Adapt it! automating apt campaign and group attribution by leveraging and linking heterogeneous filesSaha et al., 2024
View PDF- Document ID
- 3168675162936518704
- Author
- Saha A
- Blasco J
- Cavallaro L
- Lindorfer M
- Publication year
- Publication venue
- Proceedings of the 27th International Symposium on Research in Attacks, Intrusions and Defenses
External Links
Snippet
Recent years have witnessed a surge in the growth of Advanced Persistent Threats (APTs), with significant challenges to the security landscape, affecting industry, governance, and democracy. The ever-growing number of actors and the complexity of their campaigns have …
- 238000013459 approach 0 abstract description 33
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/562—Static detection
- G06F21/563—Static detection by source code analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30286—Information retrieval; Database structures therefor; File system structures therefor in structured data stores
- G06F17/30587—Details of specialised database models
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/3061—Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
- G06F17/30705—Clustering or classification
- G06F17/3071—Clustering or classification including class or cluster creation or modification
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/36—Image preprocessing, i.e. processing the image information without deciding about the identity of the image
- G06K9/46—Extraction of features or characteristics of the image
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Cozzi et al. | The tangled genealogy of IoT malware | |
| Moussaileb et al. | A survey on windows-based ransomware taxonomy and detection mechanisms | |
| Alazab | Profiling and classifying the behavior of malicious codes | |
| Chowdhury et al. | Malware analysis and detection using data mining and machine learning classification | |
| Chumachenko | Machine learning methods for malware detection and classification | |
| Poudyal et al. | Analysis of crypto-ransomware using ML-based multi-level profiling | |
| Tu et al. | Webshell detection techniques in web applications | |
| Saha et al. | Adapt it! automating apt campaign and group attribution by leveraging and linking heterogeneous files | |
| Lee et al. | Fileless cyberattacks: Analysis and classification | |
| Khanmohammadi et al. | Empirical study of android repackaged applications | |
| Nissim et al. | Keeping pace with the creation of new malicious PDF files using an active-learning based detection framework | |
| Li et al. | Cobra: interaction-aware bytecode-level vulnerability detector for smart contracts | |
| Dib et al. | EVOLIoT: A self-supervised contrastive learning framework for detecting and characterizing evolving IoT malware variants | |
| Akhtar | Malware detection and analysis: Challenges and research opportunities | |
| Adkins et al. | Heuristic malware detection via basic block comparison | |
| Oh et al. | volGPT: Evaluation on triaging ransomware process in memory forensics with Large Language Model | |
| Hannousse et al. | A deep learner model for multi-language webshell detection | |
| Alshamrani | Design and analysis of machine learning based technique for malware identification and classification of portable document format files | |
| Mohammed et al. | HAPSSA: Holistic Approach to PDF malware detection using Signal and Statistical Analysis | |
| Fang et al. | Pbdt: Python backdoor detection model based on combined features | |
| Sharma et al. | A review of detecting malware in android devices based on machine learning techniques | |
| Dubin | Content disarm and reconstruction of PDF files | |
| Brezeanu et al. | Phish Fighter: Self Updating Machine Learning Shield Against Phishing Kits Based on HTML Code Analysis | |
| Jang et al. | Function‐Oriented Mobile Malware Analysis as First Aid | |
| Chaieb et al. | Detecting android malware: From neural embeddings to hands-on validation with bertroid |