Search for dissertations about: "malware"

Showing result 1 - 5 of 13 swedish dissertations containing the word malware.

  1. 1. Automated Malware Detection and Classification Using Supervised Learning

    Author : Raja Muhammad Khurram Shahzad; Niklas Lavesson; Martin Boldt; Welf Löwe; Blekinge Tekniska Högskola; []
    Keywords : NATURVETENSKAP; NATURAL SCIENCES; Malware Detection; Android Malware; Machine Learning; Static Malware Analysis; Cyber Security; Ensemble learning; Supervised Learning; Feature Selection; Computer Science; Datavetenskap;

    Abstract : Malware has been one of the key concerns for Information Technology security researchers for decades. Every year, anti-malware companies release alarming statistics suggesting a continuous increase in the number and types of malware. READ MORE

  2. 2. MobiLeak : Security and Privacy of Personal Data in Mobile Applications

    Author : Pasquale Stirparo; Sead Muftic; Steven Marcus Furnell; KTH; []
    Keywords : TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; mobile application; security; privacy; android; forensics; malware; Informations- och kommunikationsteknik; Information and Communication Technology; Computer Science; Datalogi;

    Abstract : Smartphones and mobile applications have become an essential part of our daily lives. People always carry their smartphones with them and rely on mobile applications for most of their tasks: from checking emails for personal or business purposes, to engaging in social interactions via social networks, from trading online or checking their bank accounts to communicating with families and friends through instant messaging applications. READ MORE

  3. 3. Privacy-Invasive Software : Exploring Effects and Countermeasures

    Author : Martin Boldt; []
    Keywords : NATURVETENSKAP; NATURAL SCIENCES; Information security; privacy; malware; spyware;

    Abstract : As computers are increasingly more integrated into our daily lives, we need aiding mechanisms for separating legitimate software from their unwanted counterparts. We use the term Privacy-Invasive Software (PIS) to refer to such illegitimate software, sometimes loosely labelled as spyware. READ MORE

  4. 4. Mobile Device Security with ARM TrustZone

    Author : Sileshi Demesie Yalew; Seif Haridi; Miguel Correia; Mário Freire; KTH; []
    Keywords : TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; Android; ARM TrustZone; Malware Mobile Devices; Mobile Security; Trusted Computing;

    Abstract : Mobile devices such as smartphones are becoming the majority of computing devices due to their evolving capabilities. Currently, service providers such as nancial and healthcare institutions oer services to their clients using smartphone applications (apps). Many of these apps run on Android, the most adopted mobile operating system (OS) today. READ MORE

  5. 5. Life of a Security Middlebox : Challenges with Emerging Protocols and Technologies

    Author : Zeeshan Afzal; Stefan Lindskog; Tomas Olovsson; Karlstads universitet; []
    Keywords : TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; network security; TCP; MPTCP; IDS; Snort; edit-distance; encryption; Computer Science; Datavetenskap;

    Abstract : The Internet of today has intermediary devices known as middleboxes that perform more functions than the normal packet forwarding function of a router. Security middleboxes are a subset of these middleboxes and face an increasingly difficult task to perform their functions correctly. READ MORE