2018 6th International Conference on Future Internet of Things and Cloud Workshops (FiCloudW) 2018
DOI: 10.1109/w-ficloud.2018.00035
|View full text |Cite
|
Sign up to set email alerts
|

Towards a Fast Off-Line Static Malware Analysis Framework

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
6
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
7
1
1

Relationship

0
9

Authors

Journals

citations
Cited by 11 publications
(6 citation statements)
references
References 16 publications
0
6
0
Order By: Relevance
“…The goal of deploying cyber-threats is to gain access to sensitive data for the purpose of conducting hostile activities. In [13], the author describes an approach for developing a protected data purposeful model that complies with sensitive data requirements. Modern technologies are not being utilised at the current level of development.…”
Section: Related Studymentioning
confidence: 99%
“…The goal of deploying cyber-threats is to gain access to sensitive data for the purpose of conducting hostile activities. In [13], the author describes an approach for developing a protected data purposeful model that complies with sensitive data requirements. Modern technologies are not being utilised at the current level of development.…”
Section: Related Studymentioning
confidence: 99%
“…Another mobile malware called Skulls [30] was developed in the same year with criminal motives and later formed the basis of PC malware. The later malware was found to overwrite mobile application files and substituted applications' icons with crossbones and skulls that stopped mobile device functionalities.…”
Section: A History Of Mobile Malwarementioning
confidence: 99%
“…First of all, most of the IoT devices have low computation power which limits the complication of security system [7]. In addition, the intensification of hidden malware attacks that target the IoT systems, necessitates the quick adoption of detection method which in turn is a complicated approach [8,9]. Next, the rapid developments in IoT devices and the resultant security risks must be dealt with extremely strong data protection methods.…”
Section: Introductionmentioning
confidence: 99%