On the classification of Microsoft-Windows ransomware using hardware profile
暂无分享,去创建一个
Muhammad Arshad Islam | Muhammad Aleem | Rao Naveed Bin Rais | Muhammad Azhar Iqbal | Sana Aurangzeb | Muhammad Aleem | M. Iqbal | Sana Aurangzeb | R. N. B. Rais
[1] Alfonso Valdes,et al. Next-generation Intrusion Detection Expert System (NIDES)A Summary , 1997 .
[2] Neeraj Kumar,et al. Ransomware Evolution, Target and Safety Measures , 2018 .
[3] Iliano Cervesato,et al. On the Detection of Kernel-Level Rootkits Using Hardware Performance Counters , 2017, AsiaCCS.
[4] Mohammad Mehdi Ahmadian,et al. Connection-monitor & connection-breaker: A novel approach for prevention and detection of high survivable ransomwares , 2015, 2015 12th International Iranian Society of Cryptology Conference on Information Security and Cryptology (ISCISC).
[5] Andrew P. Bradley,et al. The use of the area under the ROC curve in the evaluation of machine learning algorithms , 1997, Pattern Recognit..
[6] J. Friedman. Greedy function approximation: A gradient boosting machine. , 2001 .
[7] Jong Hyuk Park,et al. CloudRPS: a cloud analysis based enhanced ransomware prevention system , 2016, The Journal of Supercomputing.
[8] Sung-Ryul Kim,et al. Automatic Ransomware Detection and Analysis Based on Dynamic API Calls Flow Graph , 2017, RACS.
[9] Manos Antonakakis,et al. SoK: The Challenges, Pitfalls, and Perils of Using Hardware Performance Counters for Security , 2019, 2019 IEEE Symposium on Security and Privacy (SP).
[10] J. Friedman. 1999 REITZ LECTURE GREEDY FUNCTION APPROXIMATION: A GRADIENT BOOSTING MACHINE' , 2001 .
[11] Kanad Basu,et al. Analyzing the Efficiency of Machine Learning Classifiers in Hardware-Based Malware Detectors , 2020, 2020 IEEE Computer Society Annual Symposium on VLSI (ISVLSI).
[12] Ramesh Karri,et al. Are hardware performance counters a cost effective way for integrity checking of programs , 2011, STC '11.
[13] Marcus Chung. Why employees matter in the fight against ransomware , 2019 .
[14] Ali Feizollah,et al. Evaluation of machine learning classifiers for mobile malware detection , 2014, Soft Computing.
[15] Iqbal Gondal,et al. API Based Discrimination of Ransomware and Benign Cryptographic Programs , 2020, ICONIP.
[16] Andrew Zisserman,et al. Very Deep Convolutional Networks for Large-Scale Image Recognition , 2014, ICLR.
[17] Sai Praveen Kadiyala,et al. Hardware Performance Counter-Based Fine-Grained Malware Detection , 2020, ACM Trans. Embed. Comput. Syst..
[18] Salvatore J. Stolfo,et al. On the feasibility of online malware detection with performance counters , 2013, ISCA.
[19] Xiang Zhang,et al. Character-level Convolutional Networks for Text Classification , 2015, NIPS.
[20] Daniyal M. Alghazzawi,et al. A Review on Android Ransomware Detection Using Deep Learning Techniques , 2019, MEDES.
[21] Ming Zhang,et al. An Anomaly Detection Model for Network Intrusions Using One-Class SVM and Scaling Strategy , 2015, CollaborateCom.
[22] James Christopher Foreman. A Survey of Cyber Security Countermeasures Using Hardware Performance Counters , 2018, ArXiv.
[23] William J. Buchanan,et al. Forensic Science International: Digital Investigation , 2020 .
[24] Simon Parkinson,et al. Identifying File Interaction Patterns in Ransomware Behaviour , 2018, Guide to Vulnerability Analysis for Computer Networks and Systems.
[25] Mahadevan Supramaniam,et al. Ransomware , Threat and Detection Techniques : A Review , 2019 .
[26] C. Metz. Basic principles of ROC analysis. , 1978, Seminars in nuclear medicine.
[27] Artur Lugmayr,et al. Review of Machine Learning Algorithms in Differential Expression Analysis , 2017, ArXiv.
[28] Debdeep Mukhopadhyay,et al. RAPPER: Ransomware Prevention via Performance Counters , 2018, ArXiv.
[29] Arun Kumar Sangaiah,et al. Classification of ransomware families with machine learning based on N-gram of opcodes , 2019, Future Gener. Comput. Syst..
[30] Engin Kirda,et al. UNVEIL: A large-scale, automated approach to detecting ransomware (keynote) , 2016, SANER.
[31] G. Kambourakis,et al. Feature importance in mobile malware detection , 2020, arXiv.org.
[32] Gaël Varoquaux,et al. Scikit-learn: Machine Learning in Python , 2011, J. Mach. Learn. Res..
[33] KarriRamesh,et al. Hardware Performance Counter-Based Malware Identification and Detection with Adaptive Compressive Sensing , 2016 .
[34] Andrew Crampton,et al. Guide to Vulnerability Analysis for Computer Networks and Systems , 2018, Computer Communications and Networks.
[35] Michael I. Jordan,et al. Machine learning: Trends, perspectives, and prospects , 2015, Science.
[36] Jiqiang Liu,et al. A Two-Layered Permission-Based Android Malware Detection Scheme , 2014, 2014 2nd IEEE International Conference on Mobile Cloud Computing, Services, and Engineering.
[37] Kewei Cheng,et al. Feature Selection , 2016, ACM Comput. Surv..
[38] Leyla Bilge,et al. Cutting the Gordian Knot: A Look Under the Hood of Ransomware Attacks , 2015, DIMVA.
[39] Ron Kohavi,et al. Scaling Up the Accuracy of Naive-Bayes Classifiers: A Decision-Tree Hybrid , 1996, KDD.
[40] Maninder Singh,et al. Anatomy of ransomware malware: detection, analysis and reporting , 2017, Int. J. Secur. Networks.
[41] Manuel Graña,et al. Model‐based analysis of multishell diffusion MR data for tractography: How to get over fitting problems , 2012, Magnetic resonance in medicine.
[42] Marco Chiappetta,et al. Real time detection of cache-based side-channel attacks using hardware performance counters , 2016, Appl. Soft Comput..
[43] Sayak Ray,et al. Malware detection using machine learning based analysis of virtual memory access patterns , 2017, Design, Automation & Test in Europe Conference & Exhibition (DATE), 2017.
[44] Chandan Kumar Behera,et al. Different Obfuscation Techniques for Code Protection , 2015 .
[45] Proceedings of the 2018 on Asia Conference on Computer and Communications Security , 2018, AsiaCCS.
[46] Oneil B. Victoriano. Exposing Android Ransomware using Machine Learning , 2019 .
[47] Andy Liaw,et al. Classification and Regression by randomForest , 2007 .
[48] Sanggeun Song,et al. The Effective Ransomware Prevention Technique Using Process Monitoring on Android Platform , 2016, Mob. Inf. Syst..
[49] Pavol Zavarsky,et al. Experimental Analysis of Ransomware on Windows and Android Platforms: Evolution and Characterization , 2016, FNC/MobiSPC.
[50] Yu Yang,et al. Automated Detection and Analysis for Android Ransomware , 2015, 2015 IEEE 17th International Conference on High Performance Computing and Communications, 2015 IEEE 7th International Symposium on Cyberspace Safety and Security, and 2015 IEEE 12th International Conference on Embedded Software and Systems.
[51] Lior Rokach,et al. Dynamic Malware Analysis in the Modern Era—A State of the Art Survey , 2019, ACM Comput. Surv..
[52] Sherali Zeadally,et al. Ransomware behavioural analysis on windows platforms , 2018, J. Inf. Secur. Appl..
[53] Bander Ali Saleh Al-rimy,et al. A 0-Day Aware Crypto-Ransomware Early Behavioral Detection Framework , 2017 .
[54] Bander Ali Saleh Al-rimy,et al. Ransomware threat success factors, taxonomy, and countermeasures: A survey and research directions , 2018, Comput. Secur..
[55] Luca Benini,et al. Continuous learning of HPC infrastructure models using big data analytics and in-memory processing tools , 2017, Design, Automation & Test in Europe Conference & Exhibition (DATE), 2017.
[56] Stefano Zanero,et al. HelDroid: Dissecting and Detecting Mobile Ransomware , 2015, RAID.
[57] Ramesh Karri,et al. A Theoretical Study of Hardware Performance Counters-Based Malware Detection , 2020, IEEE Transactions on Information Forensics and Security.
[58] Wooyoung Soh,et al. Design of Quantification Model for Prevent of Cryptolocker , 2015 .
[59] Fabio Martinelli,et al. On the effectiveness of system API-related information for Android ransomware detection , 2018, Comput. Secur..
[60] D. Flater. Screening for factors affecting application performance in profiling measurements , 2014 .
[61] Ramesh Karri,et al. Hardware Performance Counter-Based Malware Identification and Detection with Adaptive Compressive Sensing , 2016, ACM Trans. Archit. Code Optim..
[62] Ajay Joshi,et al. Hardware Performance Counters Can Detect Malware: Myth or Fact? , 2018, AsiaCCS.
[63] Aristide Fattori,et al. CopperDroid: Automatic Reconstruction of Android Malware Behaviors , 2015, NDSS.
[64] Mahdi Abadi,et al. HPCMalHunter: Behavioral malware detection using hardware performance counters and singular value decomposition , 2014, 2014 4th International Conference on Computer and Knowledge Engineering (ICCKE).
[65] Changjun Jiang,et al. Random forest for credit card fraud detection , 2018, 2018 IEEE 15th International Conference on Networking, Sensing and Control (ICNSC).
[66] George Ho,et al. PAPI: A Portable Interface to Hardware Performance Counters , 1999 .
[67] Robert A. Bridges,et al. Automated Behavioral Analysis of Malware: A Case Study of WannaCry Ransomware , 2017, 2017 16th IEEE International Conference on Machine Learning and Applications (ICMLA).
[68] Alexandre Gazet,et al. Comparative analysis of various ransomware virii , 2010, Journal in Computer Virology.
[69] Gowtham Ramesh,et al. Automated dynamic approach for detecting ransomware using finite-state machine , 2020, Decis. Support Syst..
[70] Arnaldo Carvalho de Melo,et al. The New Linux ’ perf ’ Tools , 2010 .
[71] Mahdi Abadi,et al. HLMD: a signature-based approach to hardware-level behavioral malware detection and classification , 2019, The Journal of Supercomputing.
[72] Azad Ali. Ransomware: A Research and a Personal Case Study of Dealing with this Nasty Malware , 2017 .
[73] Ross Brewer,et al. Ransomware attacks: detection, prevention and cure , 2016, Netw. Secur..
[74] Daniele Sgandurra,et al. Automated Dynamic Analysis of Ransomware: Benefits, Limitations and use for Detection , 2016, ArXiv.
[75] Fabio Martinelli,et al. R-PackDroid: API package-based characterization and detection of mobile ransomware , 2017, SAC.