Search
Now showing items 1-3 of 3
Effective Crypto Ransomware Detection Using Hardware Performance Counters
(2019-05-16)
Systems affected by malware in the past 10 years has risen from 29 million to 780 million, which tells us it is a rapidly growing threat. Viruses, ransomware, worms, backdoors, botnets, etc. all come under malware. Ransomware ...
Practical Indirect Control Flow Analysis for Binary Executables
(2023-04-27)
Resolving indirect control flow is one of the fundamental challenges in binary analysis. Improving the accuracy of the indirect control flow analysis is vital to the binary analysis domain. Many analysis algorithms and ...
STATEFUL DETECTION OF STEALTHY BEHAVIORS IN ANDROID APPS
(2017-08-08)
The number of smartphones has increased greatly during the last few years. Among the popular mobile operating systems (such as iOS and Android) installed on these devices, Android captures most of the mobile market share. ...