Algorithms to isolation of logical and physical objects from malicious software

Author(s):  
S. S. Kasimov ◽  
D. N. Rahmatov
2013 ◽  
Vol 8 (2) ◽  
pp. 175-187 ◽  
Author(s):  
Lucy Talbot

The Metropolitan Police’s Crime Museum, famously known as the Black Museum, exhibits evidence from some of the most appalling crimes committed within English society from the late-Victorian era into modernity. Public admittance to this museum is strictly prohibited, preventing all but police staff from viewing the macabre exhibitions held within. The physical objects on display may vary, but whether the viewer is confronted with household items, weaponry or human remains, the evidence before them is undeniably associated with the immorality surrounding the performance of a socially bad death, of murder. These items have an object biography, they are both contextualized and contextualize the environment in which they reside. But one must question the purpose of such a museum, does it merely act as a Chamber of Horrors evoking the anomie of English society in physical form, or do these exhibits have an educational intent, restricted to their liminal space inside New Scotland Yard, to be used as a pedagogical tool in the development of new methods of murder investigation.


Author(s):  
Nikolai Karepanov

The author argues that traces include surrounding reality objects (physical objects and fields), altered by phenomena or events that occurred as a result of movement, processes and actions. The identification and investigation of traces of the investigated events is most often carried out at the places of their occurrence, separately studied and analyzed after their seizure in specially adapted and appropriately equipped conditions. The methods of traces detection are very diverse and are being constantly improved, so it is difficult even to classify them. Still, it is possible to distinguish some methodologies proposed in theory and practice. The author considers some methods of identifying traces when searching for living persons and corpses, identifying corpses; identifying and fixing traces of human hands; identifying traces on payment cards; identifying electronic traces, identifying traces of removing embossed images; identifying traces using the latest achievements of science and technology; identifying traces and constructing sign systems in description of material objects. The necessity of introduction of a standard of detecting and investigating the traces of crimes is also discussed, and a system of actions that should be included into this standard is proposed.


Author(s):  
T. M. Robinson

This article argues the following five claims: 1. Plato’s description of the origins of cosmos in the Timaeus is not a myth, nor something unlikely: when he called it an eikos mythos or eikos logos, he meant a likely or trustworthy account on this very subject. 2. Among the details in this account, the following are prominent and surprising: a) the world was fashioned in time, in that precise point that was the beginning of time; b) several kinds of duration can be distinguished in cosmology (mainly eternity, sempiternity, perpetuity and time); and c) space is an entity characterized by movement and tension. 3. In the Statesman, Plato repeats much the same thing, adding this time the strange notion that the universe’s circular movement is periodically reversed. 4. In spite of the important differences in detail, there is a striking similarity between Plato’s account of the origins of the world and the explanation adopted by much of modern cosmology. 5. What Plato shares with so many instances of recent thought is here termed “cosmological imaginativity”. A first section of the paper deals exclusively with the Timaeus. Claims 1 and 2a are supported by a revision of the meanings of mythos and logos, followed by brief reference and discussion of the argument at Timaeus 27d, leading to the conclusion that Plato affirms that the ever-changing world has indeed had a beginning in time. Claim 2b describes five different types of duration, corresponding to Forms, the Demiurge, Space, the [empirical] world and its contents, physical objects. The second section is concerned with the myth in the Statesman, discussing it as a parallel and describing its peculiar turn to the Timaeus’ cosmology and cosmogony, a complex spheric and dynamic model. After digressing into some important ideas in modern cosmology, touching especially on affinities of some of Einstein’s ideas with of Plato’s own, the paper closes with a discussion of cosmological imaginativity, oriented to recover and recognize fully Plato’s greatness as a cosmologist.


Author(s):  
J. Christopher Maloney

The supposed problem of perceptual error, including illusion and hallucination, has led most theories of perception to deny formulations of direct realism. The standard response to this apparent problem adopts the mistaken presupposition that perception is indeed liable to error. However, the prevailing conditions of observation are themselves elements of perceptual representation, functioning in the manner of predicate modifiers. They ensure that the predicates applied in perceptual representations do indeed correctly attribute properties that perceived physical objects actually instantiate. Thus, perceptual representations are immune to misrepresentation of the sort misguidedly supposed by the spurious problem of perceptual misrepresentation. Granted the possibility that perceptual attribution admits of predicate modification, it is quite possible that perceptual experience permits both rudimentary and sophisticated conceptualization. Moreover, such treatment of perceptual predication rewards by providing an account of aspect alteration exemplified by perception of ambiguous stimuli.


Information ◽  
2021 ◽  
Vol 12 (3) ◽  
pp. 118
Author(s):  
Vassilios Moussas ◽  
Antonios Andreatos

Malware creators generate new malicious software samples by making minor changes in previously generated code, in order to reuse malicious code, as well as to go unnoticed from signature-based antivirus software. As a result, various families of variations of the same initial code exist today. Visualization of compiled executables for malware analysis has been proposed several years ago. Visualization can greatly assist malware classification and requires neither disassembly nor code execution. Moreover, new variations of known malware families are instantly detected, in contrast to traditional signature-based antivirus software. This paper addresses the problem of identifying variations of existing malware visualized as images. A new malware detection system based on a two-level Artificial Neural Network (ANN) is proposed. The classification is based on file and image features. The proposed system is tested on the ‘Malimg’ dataset consisting of the visual representation of well-known malware families. From this set some important image features are extracted. Based on these features, the ANN is trained. Then, this ANN is used to detect and classify other samples of the dataset. Malware families creating a confusion are classified by a second level of ANNs. The proposed two-level ANN method excels in simplicity, accuracy, and speed; it is easy to implement and fast to run, thus it can be applied to antivirus software, smart firewalls, web applications, etc.


Entropy ◽  
2021 ◽  
Vol 23 (5) ◽  
pp. 507
Author(s):  
Piotr Białczak ◽  
Wojciech Mazurczyk

Malicious software utilizes HTTP protocol for communication purposes, creating network traffic that is hard to identify as it blends into the traffic generated by benign applications. To this aim, fingerprinting tools have been developed to help track and identify such traffic by providing a short representation of malicious HTTP requests. However, currently existing tools do not analyze all information included in the HTTP message or analyze it insufficiently. To address these issues, we propose Hfinger, a novel malware HTTP request fingerprinting tool. It extracts information from the parts of the request such as URI, protocol information, headers, and payload, providing a concise request representation that preserves the extracted information in a form interpretable by a human analyst. For the developed solution, we have performed an extensive experimental evaluation using real-world data sets and we also compared Hfinger with the most related and popular existing tools such as FATT, Mercury, and p0f. The conducted effectiveness analysis reveals that on average only 1.85% of requests fingerprinted by Hfinger collide between malware families, what is 8–34 times lower than existing tools. Moreover, unlike these tools, in default mode, Hfinger does not introduce collisions between malware and benign applications and achieves it by increasing the number of fingerprints by at most 3 times. As a result, Hfinger can effectively track and hunt malware by providing more unique fingerprints than other standard tools.


Sign in / Sign up

Export Citation Format

Share Document