Davenport, 2024 - Google Patents
Tapped In: The Rise of Mobile MalwareDavenport, 2024
View PDF- Document ID
- 16871286497909745137
- Author
- Davenport C
- Publication year
External Links
Snippet
As the world of technology continues to evolve and become more advanced with our life, so do the dangers and threats that are determined to hinder that development. Malware continues to be a danger to internet surfers or people with access to technology. At first it …
- 241000700605 Viruses 0 abstract description 17
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/562—Static detection
- G06F21/563—Static detection by source code analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/554—Detecting local intrusion or implementing counter-measures involving event detection and direct action
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/52—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
- G06F21/54—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow by adding security routines or objects to programs
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/51—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Nadir et al. | Contemporary cybercrime: A taxonomy of ransomware threats & mitigation techniques | |
EP3017393B1 (en) | System and method for web application security | |
Kalla et al. | Phishing detection implementation using databricks and artificial Intelligence | |
US10904287B2 (en) | Protecting against notification based phishing attacks | |
Ahmed et al. | Survey of keylogger technologies | |
US11003746B1 (en) | Systems and methods for preventing electronic form data from being electronically transmitted to untrusted domains | |
Vanness et al. | Malware: A Software for Cybercrime | |
Sandhu et al. | Google safe browsing-web security | |
Gagneja et al. | Computational security and the economics of password hacking | |
Gowda et al. | Data breach as a threat in the banking sector and steps to avoid it | |
Jimada et al. | Analysis of ransomware, methodologies used by attackers and mitigation techniques | |
Fu et al. | Analysis of botnet counter-counter-measures | |
Rao et al. | Malicious software and anti-virus software | |
Tidke et al. | Detection and prevention of Android malware thru permission analysis | |
Davenport | Tapped In: The Rise of Mobile Malware | |
Narain | Ransomware-rising menace to an unsuspecting cyber audience | |
Yadav et al. | Malware techniques and its effect: A survey | |
Chopra et al. | PERSPECTIVES OF VARIOUS CYBER SECURITY THREATS AND DEFENSE MECHANISMS IN THE MODERN WORLD | |
Domazet | Phishing and pharming attacks aimed at identity theft of internet users | |
Kaur | A Study of Cyber Security and Cyber Threats | |
Rogozhkina | Cybersecurity in banking | |
Burke | Windows Management and Cybersecurity: Latest Security Threats and Mitigation Strategies | |
Jøsang | Attack Vectors and Malware | |
Datta et al. | Key Logger and Prevention of Security Breaches | |
Vergos | Cybersecurity |