[go: up one dir, main page]

Davenport, 2024 - Google Patents

Tapped In: The Rise of Mobile Malware

Davenport, 2024

View PDF
Document ID
16871286497909745137
Author
Davenport C
Publication year

External Links

Snippet

As the world of technology continues to evolve and become more advanced with our life, so do the dangers and threats that are determined to hinder that development. Malware continues to be a danger to internet surfers or people with access to technology. At first it …
Continue reading at digitalcommons.odu.edu (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection
    • G06F21/563Static detection by source code analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/554Detecting local intrusion or implementing counter-measures involving event detection and direct action
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/52Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
    • G06F21/54Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow by adding security routines or objects to programs
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/51Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability

Similar Documents

Publication Publication Date Title
Nadir et al. Contemporary cybercrime: A taxonomy of ransomware threats & mitigation techniques
EP3017393B1 (en) System and method for web application security
Kalla et al. Phishing detection implementation using databricks and artificial Intelligence
US10904287B2 (en) Protecting against notification based phishing attacks
Ahmed et al. Survey of keylogger technologies
US11003746B1 (en) Systems and methods for preventing electronic form data from being electronically transmitted to untrusted domains
Vanness et al. Malware: A Software for Cybercrime
Sandhu et al. Google safe browsing-web security
Gagneja et al. Computational security and the economics of password hacking
Gowda et al. Data breach as a threat in the banking sector and steps to avoid it
Jimada et al. Analysis of ransomware, methodologies used by attackers and mitigation techniques
Fu et al. Analysis of botnet counter-counter-measures
Rao et al. Malicious software and anti-virus software
Tidke et al. Detection and prevention of Android malware thru permission analysis
Davenport Tapped In: The Rise of Mobile Malware
Narain Ransomware-rising menace to an unsuspecting cyber audience
Yadav et al. Malware techniques and its effect: A survey
Chopra et al. PERSPECTIVES OF VARIOUS CYBER SECURITY THREATS AND DEFENSE MECHANISMS IN THE MODERN WORLD
Domazet Phishing and pharming attacks aimed at identity theft of internet users
Kaur A Study of Cyber Security and Cyber Threats
Rogozhkina Cybersecurity in banking
Burke Windows Management and Cybersecurity: Latest Security Threats and Mitigation Strategies
Jøsang Attack Vectors and Malware
Datta et al. Key Logger and Prevention of Security Breaches
Vergos Cybersecurity