[go: up one dir, main page]

Saha et al., 2024 - Google Patents

Adapt it! automating apt campaign and group attribution by leveraging and linking heterogeneous files

Saha et al., 2024

View PDF
Document ID
3168675162936518704
Author
Saha A
Blasco J
Cavallaro L
Lindorfer M
Publication year
Publication venue
Proceedings of the 27th International Symposium on Research in Attacks, Intrusions and Defenses

External Links

Snippet

Recent years have witnessed a surge in the growth of Advanced Persistent Threats (APTs), with significant challenges to the security landscape, affecting industry, governance, and democracy. The ever-growing number of actors and the complexity of their campaigns have …
Continue reading at dl.acm.org (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection
    • G06F21/563Static detection by source code analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30286Information retrieval; Database structures therefor; File system structures therefor in structured data stores
    • G06F17/30587Details of specialised database models
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/3061Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
    • G06F17/30705Clustering or classification
    • G06F17/3071Clustering or classification including class or cluster creation or modification
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/36Image preprocessing, i.e. processing the image information without deciding about the identity of the image
    • G06K9/46Extraction of features or characteristics of the image

Similar Documents

Publication Publication Date Title
Cozzi et al. The tangled genealogy of IoT malware
Moussaileb et al. A survey on windows-based ransomware taxonomy and detection mechanisms
Alazab Profiling and classifying the behavior of malicious codes
Chowdhury et al. Malware analysis and detection using data mining and machine learning classification
Chumachenko Machine learning methods for malware detection and classification
Poudyal et al. Analysis of crypto-ransomware using ML-based multi-level profiling
Tu et al. Webshell detection techniques in web applications
Saha et al. Adapt it! automating apt campaign and group attribution by leveraging and linking heterogeneous files
Lee et al. Fileless cyberattacks: Analysis and classification
Khanmohammadi et al. Empirical study of android repackaged applications
Nissim et al. Keeping pace with the creation of new malicious PDF files using an active-learning based detection framework
Li et al. Cobra: interaction-aware bytecode-level vulnerability detector for smart contracts
Dib et al. EVOLIoT: A self-supervised contrastive learning framework for detecting and characterizing evolving IoT malware variants
Akhtar Malware detection and analysis: Challenges and research opportunities
Adkins et al. Heuristic malware detection via basic block comparison
Oh et al. volGPT: Evaluation on triaging ransomware process in memory forensics with Large Language Model
Hannousse et al. A deep learner model for multi-language webshell detection
Alshamrani Design and analysis of machine learning based technique for malware identification and classification of portable document format files
Mohammed et al. HAPSSA: Holistic Approach to PDF malware detection using Signal and Statistical Analysis
Fang et al. Pbdt: Python backdoor detection model based on combined features
Sharma et al. A review of detecting malware in android devices based on machine learning techniques
Dubin Content disarm and reconstruction of PDF files
Brezeanu et al. Phish Fighter: Self Updating Machine Learning Shield Against Phishing Kits Based on HTML Code Analysis
Jang et al. Function‐Oriented Mobile Malware Analysis as First Aid
Chaieb et al. Detecting android malware: From neural embeddings to hands-on validation with bertroid