Cargando…
Memory snapshot dataset of a compromised host with malware using obfuscation evasion techniques
This article presents a dataset for studying the detection of obfuscated malware in volatile computer memory. Several obfuscated reverse remote shells were generated using Metasploit-Framework, Hyperion, and PEScrambler tools. After compromising the host, Memory snapshots of a Windows 10 virtual mac...
Autores principales: | Sadek, Ibrahim, Chong, Penny, Rehman, Shafiq Ul, Elovici, Yuval, Binder, Alexander |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
Elsevier
2019
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC6743008/ https://www.ncbi.nlm.nih.gov/pubmed/31528674 http://dx.doi.org/10.1016/j.dib.2019.104437 |
Ejemplares similares
-
Web Application Obfuscation: '-WAFsEvasionFiltersalert(Obfuscation)-'
por: Heiderich, Mario, et al.
Publicado: (2010) -
The rise of obfuscated Android malware and impacts on detection methods
por: Elsersy, Wael F., et al.
Publicado: (2022) -
Obfuscated Memory Malware Detection in Resource-Constrained IoT Devices for Smart City Applications
por: Shafin, Sakib Shahriar, et al.
Publicado: (2023) -
On the evaluation of android malware detectors against code-obfuscation techniques
por: Nawaz, Umair, et al.
Publicado: (2022) -
Evaluation and classification of obfuscated Android malware through deep learning using ensemble voting mechanism
por: Aurangzeb, Sana, et al.
Publicado: (2023)