This paper focuses on the anticipatory enhancement of methods of detecting stealth software. Cyber security detection tools are insufficiently powerful to reveal the most recent cyber-attacks which use malware. In this paper, we will present first an idea of the highest stealth malware, as this is the most complicated scenario for detection because it combines both existing anti-forensic techniques together with their potential improvements. Second, we will present new detection methods which are resilient to this hidden prototype. To help solve this detection challenge, we have analyzed Windows’ memory content using a new method of Shannon Entropy calculation; methods of digital photogrammetry; the Zipf–Mandelbrot law, as well as by disass...
The continued increase in the use of computer systems in recent times has led to a significant rise ...
Malware is one of the biggest security threat today and deploying effective defensive solutions requ...
Malicious programs spy on users’ behavior and compromise their privacy. Unfortunately, existing tech...
Volatile memory dump and its analysis is an essential part of digital forensics. Among a number of v...
According to recent security analysis reports, malicious software (a.k.a. malware) is rising at an a...
Hardware virtualization technologies play a significant role in cyber security. On the one hand thes...
Malware brings significant threats to modern digitized society. Malware developers put in significan...
The operating system kernel serves as the root of trust for all applications running on the computer...
Real-time malware analysis requires processing large amounts of data storage to look for suspicious ...
This is a post-print version of this article to see the final version go to the following citation ...
The current online world is constantly affected by malicious software such as viruses, Trojans, worm...
Cyberattacks are the fastest growing crime in the U.S., and they are increasing in size, sophisticat...
AbstractTo a great degree, research in memory forensics concentrates on the acquisition and analysis...
In today\u27s world of advanced computing power at the fingertips of any user, we must constantly th...
Cybersecurity is the biggest threat in the world. More and more people are used to storing personal ...
The continued increase in the use of computer systems in recent times has led to a significant rise ...
Malware is one of the biggest security threat today and deploying effective defensive solutions requ...
Malicious programs spy on users’ behavior and compromise their privacy. Unfortunately, existing tech...
Volatile memory dump and its analysis is an essential part of digital forensics. Among a number of v...
According to recent security analysis reports, malicious software (a.k.a. malware) is rising at an a...
Hardware virtualization technologies play a significant role in cyber security. On the one hand thes...
Malware brings significant threats to modern digitized society. Malware developers put in significan...
The operating system kernel serves as the root of trust for all applications running on the computer...
Real-time malware analysis requires processing large amounts of data storage to look for suspicious ...
This is a post-print version of this article to see the final version go to the following citation ...
The current online world is constantly affected by malicious software such as viruses, Trojans, worm...
Cyberattacks are the fastest growing crime in the U.S., and they are increasing in size, sophisticat...
AbstractTo a great degree, research in memory forensics concentrates on the acquisition and analysis...
In today\u27s world of advanced computing power at the fingertips of any user, we must constantly th...
Cybersecurity is the biggest threat in the world. More and more people are used to storing personal ...
The continued increase in the use of computer systems in recent times has led to a significant rise ...
Malware is one of the biggest security threat today and deploying effective defensive solutions requ...
Malicious programs spy on users’ behavior and compromise their privacy. Unfortunately, existing tech...