2021
DOI: 10.1145/3429741
|View full text |Cite
|
Sign up to set email alerts
|

One Size Does Not Fit All

Abstract: Malware analysis is an essential task to understand infection campaigns, the behavior of malicious codes, and possible ways to mitigate threats. Malware analysis also allows better assessment of attackers’ capabilities, techniques, and processes. Although a substantial amount of previous work provided a comprehensive analysis of the international malware ecosystem, research on regionalized, country-, and population-specific malware campaigns have been scarce. Moving towards addressing this gap, we conducted a … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2021
2021
2025
2025

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 11 publications
(3 citation statements)
references
References 26 publications
0
3
0
Order By: Relevance
“…Attackers can use malicious software to gain unauthorized access to systems. Malware can be utilized to hijack sessions, steal passwords, and even set keyloggers on victims' machines [93], [96], [97], [105] [106].…”
Section: B Threat-facing Online Bankingmentioning
confidence: 99%
“…Attackers can use malicious software to gain unauthorized access to systems. Malware can be utilized to hijack sessions, steal passwords, and even set keyloggers on victims' machines [93], [96], [97], [105] [106].…”
Section: B Threat-facing Online Bankingmentioning
confidence: 99%
“…Some underground market-related properties are also retrieved by previous work, for instance, price [91], key actors [78], [93], [94], [123] and product types [51], [57]. Other works studied malware-related intelligence such as malware download channel [92], geolocation of malware campaigns [39], malware sample feed [106] and the value chain of Ransomware-as-a-Service economy [79].…”
Section: Related Workmentioning
confidence: 99%
“…It points to a specific URL or code to be executed and downloads other malware. It also attempts to gain privilege over the device [15], [286]- [288].…”
Section: Backdoormentioning
confidence: 99%