2015
DOI: 10.1093/comjnl/bxv047
|View full text |Cite
|
Sign up to set email alerts
|

Toward a Taxonomy of Malware Behaviors

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
15
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 32 publications
(15 citation statements)
references
References 25 publications
0
15
0
Order By: Relevance
“…Traditional computing environments are mainly based on X86 architecture, there exists a wide array of studies on malware propagation and analysis in X86 and/or X64 without consideration of device interaction with other architectures hence homogeneity based on specific architecture and operating system. Examples of such studies includes: on malware taxonomies [38,61,62], on malware detection [63][64][65][66][67], malware propagation [68] and malware analysis [69]. Windows variants of operating systems in both X86 and X64 architectures are most vulnerable to malware infections.…”
Section: Platforms and Iot Malwarementioning
confidence: 99%
“…Traditional computing environments are mainly based on X86 architecture, there exists a wide array of studies on malware propagation and analysis in X86 and/or X64 without consideration of device interaction with other architectures hence homogeneity based on specific architecture and operating system. Examples of such studies includes: on malware taxonomies [38,61,62], on malware detection [63][64][65][66][67], malware propagation [68] and malware analysis [69]. Windows variants of operating systems in both X86 and X64 architectures are most vulnerable to malware infections.…”
Section: Platforms and Iot Malwarementioning
confidence: 99%
“…To infect users through app stores, malwares are submitted to them hiding as some legitimate app. In fact, in some cases some popular apps are modified to include malicious actions while keeping the app's main functionalities [17].…”
Section: Malware Definition and Statisticsmentioning
confidence: 99%
“…The hackers monitor how far it could spread with the information system of an organization. The malware remains dormant in the systems and its exploits can only be witnessed when a technical flaw in the information system is exposed and allows it to spread further [33][34][35].…”
Section: Goals Of Social Engineering Attacksmentioning
confidence: 99%
“…Furthermore, with the progress of new technology, social engineering attacks also extend to include media of videos. Recent attacks also include the use of botnets, rootkits, and superstitious software to impact the devices of the victims [4,35,40,51].…”
Section: Fig 2: Mechanism Of Social Engineering Attacksmentioning
confidence: 99%
See 1 more Smart Citation