Sökning: "Malware Analysis"

Visar resultat 1 - 5 av 40 uppsatser innehållade orden Malware Analysis.

  1. 1. Android Malware Detection Using Machine Learning

    Kandidat-uppsats, Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Författare :Rahul Sai Kesani; [2024]
    Nyckelord :Malware; Machine Learning; Random Forest; Sequential Neural Network.;

    Sammanfattning : Background. The Android smartphone, with its wide range of uses and excellent performance, has attracted numerous users. Still, this domination of the Android platform also has motivated the attackers to develop malware. The traditional methodology which detects the malware based on the signature is unfit to discover unknown applications. LÄS MER

  2. 2. Masking revealing hardware attributes in the source code of a hypervisor : A study exploring strategies to hide the identity of virtual environments during malware analysis

    Uppsats för yrkesexamina på avancerad nivå, Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Författare :Kevin Engström; Robin Lenz; [2023]
    Nyckelord :Sandbox detection; analysis evasion; virtual environment; masking;

    Sammanfattning : Background: Malware is responsible for a significant part of the ever increasing cost of cyberattacks. Malware analysis is an important part in minimizing these costs. LÄS MER

  3. 3. A command-and-control malware design using cloud covert channels : Revealing elusive covert channels with Microsoft Teams

    Master-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Författare :Massimo Bertocchi; [2023]
    Nyckelord :Covert channel; Command and Control; Microsoft Teams; Detection; Hemlig kanal; ledning och kontroll; Microsoft Teams; upptäckt;

    Sammanfattning : With the rise of remote working, business communication platforms such as Microsoft Teams have become indispensable tools deeply ingrained in the workflow of every employee. However, their increasing importance have made the identification and analysis of covert channels a critical concern for both individuals and organizations. LÄS MER

  4. 4. Assessing Ransomware Mitigation Strategies in Swedish Organizations: A Focus on Phishing Emails

    Kandidat-uppsats, Stockholms universitet/Institutionen för data- och systemvetenskap

    Författare :Johan Liedgren; Felix von Bonsdorff; [2023]
    Nyckelord :Ransomware; ransomware mitigation; phishing; phishing emails; malware prevention strategies;

    Sammanfattning : Ransomware has been a growing threat to today's organizations, with irreparable damages and billions of dollars lost, it is crucial for organizations to implement mitigation strategies that can counter these attacks. With phishing attempts being the primary attack vector, it is evident that organizations need to implement the best practices in order to avoid the consequences. LÄS MER

  5. 5. Internet of Things i smarta hemmet : En systematisk litteraturstudie för att kartlägga attackmetoder och verktyg

    Kandidat-uppsats, Högskolan i Skövde/Institutionen för informationsteknologi

    Författare :Tommy Nylén; [2023]
    Nyckelord :IoT; Internet of Things; smarta hemmet; attack; metod; verktyg; IoT; Internet of Things; smart home; attack; method; tools;

    Sammanfattning : Senaste åren har Internet of Things (IoT) haft en explosionsartad utveckling. En underkategori till IoT är det smarta hemmet, där smarta enheter kopplas samman med ett nätverk. Flera exempel på smarta enheter är smarta lampor, termostater, dörrlås, säkerhetskameror, smarta kylskåp och smarta tvättmaskiner. LÄS MER