2020
DOI: 10.1007/978-1-4842-6193-4
|View full text |Cite
|
Sign up to set email alerts
|

Malware Analysis and Detection Engineering

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
12
0
2

Year Published

2021
2021
2024
2024

Publication Types

Select...
3
2
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 22 publications
(14 citation statements)
references
References 0 publications
0
12
0
2
Order By: Relevance
“…A classification of malware dynamic analysis evasion strategies was presented in [50]. Conventionally, a sandbox was introduced to suffer unplanned impacts from unknown software [51]. Thus, the term sandbox represents a segregated or highly managed environment for testing unverified programs.…”
Section: Various Malware Attacks In Iotmentioning
confidence: 99%
“…A classification of malware dynamic analysis evasion strategies was presented in [50]. Conventionally, a sandbox was introduced to suffer unplanned impacts from unknown software [51]. Thus, the term sandbox represents a segregated or highly managed environment for testing unverified programs.…”
Section: Various Malware Attacks In Iotmentioning
confidence: 99%
“…. [2][3][4]. Malware is a generic term that refers to different types, also families or classes, of malicious programs.…”
Section: Introductionmentioning
confidence: 99%
“…Malware is a generic term that refers to different types, also families or classes, of malicious programs. Several classifications of malware exist in the literature such as the ones in [2][3][4]. Six main families are to be distinguished: Virus, Worm, Trojan Horse, Ransomware, Botnet and Backdoor.…”
Section: Introductionmentioning
confidence: 99%
“…Malware plays a key role in attacking computer systems [1]. Typically, malware sabotages the purpose of the machine instructions executing on a digital computer.…”
Section: Introductionmentioning
confidence: 99%
“…Typically, malware sabotages the purpose of the machine instructions executing on a digital computer. Also, there is no computational mechanism in the register machine model [2,3,4] 1 for healing (selfrepairing) damaged instructions.…”
Section: Introductionmentioning
confidence: 99%