Taking a Lesson from Stealthy Rootkits
IEEE Security and Privacy
A framework for spyware assessment
Communications of the ACM - Spyware
Toward Automated Dynamic Malware Analysis Using CWSandbox
IEEE Security and Privacy
Code Normalization for Self-Mutating Malware
IEEE Security and Privacy
Awareness Education as the Key to Ransomware Prevention
Information Systems Security
Rootkits and Their Effects on Information Security
Information Systems Security
Observations on emerging threats
LEET'12 Proceedings of the 5th USENIX conference on Large-Scale Exploits and Emergent Threats
Hi-index | 0.00 |
Much as information systems themselves evolve and incorporate innovation, so too has malicious software, or "malware." The increasing threat to those who use and trust in these systems is dangerous to overlook. This article examines recent trends in malware development. Reviewing statistics of dangerous infections of various malware families, it also expands on recent developments of actual exploit code. It further expands on the evolution of recent malware development techniques, particularly the use of malware development kits, or "exploit kits." Mobile exploits taking advantage of smart phones, as well as malicious "polymorphic" code that self-mutates to evade detection are also discussed in detail.