One Size Does Not Fit All

2021 ◽  
Vol 24 (2) ◽  
pp. 1-31
Author(s):  
Marcus Botacin ◽  
Hojjat Aghakhani ◽  
Stefano Ortolani ◽  
Christopher Kruegel ◽  
Giovanni Vigna ◽  
...  

Malware analysis is an essential task to understand infection campaigns, the behavior of malicious codes, and possible ways to mitigate threats. Malware analysis also allows better assessment of attackers’ capabilities, techniques, and processes. Although a substantial amount of previous work provided a comprehensive analysis of the international malware ecosystem, research on regionalized, country-, and population-specific malware campaigns have been scarce. Moving towards addressing this gap, we conducted a longitudinal (2012-2020) and comprehensive (encompassing an entire population of online banking users) study of MS Windows desktop malware that actually infected Brazilian banks’ users. We found that the Brazilian financial desktop malware has been evolving quickly: it started to make use of a variety of file formats instead of typical PE binaries, relied on native system resources, and abused obfuscation techniques to bypass detection mechanisms. Our study on the threats targeting a significant population on the ecosystem of the largest and most populous country in Latin America can provide invaluable insights that may be applied to other countries’ user populations, especially those in the developing world that might face cultural peculiarities similar to Brazil’s. With this evaluation, we expect to motivate the security community/industry to seriously consider a deeper level of customization during the development of next-generation anti-malware solutions, as well as to raise awareness towards regionalized and targeted Internet threats.

2019 ◽  
Author(s):  
Felipe Vaca-Paniagua ◽  
Rosalia Quezada-Urban ◽  
Clara Estela Díaz Velásquez ◽  
Eva María Gómez García ◽  
Claudia Fabiola Méndez Catalá ◽  
...  

The Oxford Handbook of Nigerian Politics offers a comprehensive analysis of Nigeria’s very rich history and ever-changing politics to its readers. It provides a deep understanding of Nigeria’s sociopolitical evolution and experience by covering a broad range of political issues and historical eras. The volume encompasses forty-four chapters organized thematically into essays covering history, political institutions, civil society, economic and social policy, identity and insecurity, and Nigeria in a globalized world. By identifying many of the classic debates in Nigerian politics, the chapters serve as an authoritative introduction to Africa’s most populous country. The chapters are interdisciplinary, introducing readers to classic debates and key research on Nigeria, as well as new methodologies, new data, and a compelling corpus of research questions for the next generation of researchers and readers interested in Africa.


2009 ◽  
Vol 9 (2) ◽  
pp. 219-248 ◽  
Author(s):  
John P. Tuman ◽  
Jonathan R. Strand ◽  
Craig F. Emmert

Three perspectives on the determinants of Japan's official development assistance (ODA) program are often represented as distinct, valid explanations of the aid program. Yet few studies have attempted to simultaneously test the hypotheses generated from all three perspectives in a global study of Japanese aid flows. This study seeks to improve the understanding of the Japanese ODA program by addressing some of the gaps in the existing literature. Providing a comprehensive analysis, the article investigates the effects of different political and economic variables on Japanese aid disbursement in eighty-six countries in Africa, Asia, Latin America, and the Middle East from 1979 to 2002. The findings of the study make several contributions to the literature. First, the results provide strong support for the claim that humanitarian concerns, as measured by poverty and human rights conditions in recipient countries, are important determinants of aid allocation. Second, although much of the previous literature has hypothesized that Japan's aid program seeks to promote Japan's economic interests, little empirical support for this view is found in the present study. Likewise, the disbursement pattern of ODA was associated with only a limited number of US security interests; US economic interests are shown to have no effect on ODA.


2021 ◽  
Author(s):  
Raj chaganti ◽  
vinayakumar R ◽  
Mamoun Alazab ◽  
Tuan Pham

<div>Malware distribution to the victim network is commonly performed through file attachments in phishing email or downloading illegitimate files from the internet, when the victim interacts with the source of infection. To detect and prevent the malware distribution in the victim machine, the existing end device security applications may leverage sophisticated techniques such as signature-based or anomaly-based, machine learning techniques. The well-known file formats Portable Executable (PE) for Windows and Executable and Linkable Format (ELF) for Linux based operating system are used for malware analysis and the malware detection capabilities of these files has been well advanced for real time detection. But the malware payload hiding in multimedia like cover images using steganography detection has been a challenge for enterprises, as these are rarely seen and usually act as a stager in sophisticated attacks. In this article, to our knowledge, we are the first to try to address the knowledge gap between the current progress in image steganography and steganalysis academic research focusing on data hiding and the review of the stegomalware (malware payload hiding in images) targeting enterprises with cyberattacks current status. We present the stegomalware history, generation tools, file format specification description. Based on our findings, we perform the detail review of the image steganography techniques including the recent Generative Adversarial Networks (GAN) based models and the image steganalysis methods including the Deep Learning opportunities and challenges in stegomalware generation and detection are presented based on our findings.</div>


2019 ◽  
Author(s):  
Felipe Vaca-Paniagua ◽  
Rosalia Quezada-Urban ◽  
Clara Estela Díaz Velásquez ◽  
Eva María Gómez García ◽  
Claudia Fabiola Méndez Catalá ◽  
...  

2021 ◽  
Author(s):  
María Elena Medina‐Mora ◽  
Maristela Monteiro ◽  
Claudia Rafful ◽  
Itzel Samano

Electronics ◽  
2020 ◽  
Vol 9 (5) ◽  
pp. 793
Author(s):  
Chanwoong Hwang ◽  
Junho Hwang ◽  
Jin Kwak ◽  
Taejin Lee

Most cyberattacks use malicious codes, and according to AV-TEST, more than 1 billion malicious codes are expected to emerge in 2020. Although such malicious codes have been widely seen around the PC environment, they have been on the rise recently, focusing on IoT devices such as smartphones, refrigerators, irons, and various sensors. As is known, Linux/embedded environments support various architectures, so it is difficult to identify the architecture in which malware operates when analyzing malware. This paper proposes an AI-based malware analysis technology that is not affected by the operating system or architecture platform. The proposed technology works intuitively. It uses platform-independent binary data rather than features based on the structured format of the executable files. We analyzed the strings from binary data to classify malware. The experimental results achieved 94% accuracy on Windows and Linux datasets. Based on this, we expect the proposed technology to work effectively on other platforms and improve through continuous operation/verification.


2021 ◽  
Author(s):  
Raj chaganti ◽  
vinayakumar R ◽  
Mamoun Alazab ◽  
Tuan Pham

<div>Malware distribution to the victim network is commonly performed through file attachments in phishing email or downloading illegitimate files from the internet, when the victim interacts with the source of infection. To detect and prevent the malware distribution in the victim machine, the existing end device security applications may leverage sophisticated techniques such as signature-based or anomaly-based, machine learning techniques. The well-known file formats Portable Executable (PE) for Windows and Executable and Linkable Format (ELF) for Linux based operating system are used for malware analysis and the malware detection capabilities of these files has been well advanced for real time detection. But the malware payload hiding in multimedia like cover images using steganography detection has been a challenge for enterprises, as these are rarely seen and usually act as a stager in sophisticated attacks. In this article, to our knowledge, we are the first to try to address the knowledge gap between the current progress in image steganography and steganalysis academic research focusing on data hiding and the review of the stegomalware (malware payload hiding in images) targeting enterprises with cyberattacks current status. We present the stegomalware history, generation tools, file format specification description. Based on our findings, we perform the detail review of the image steganography techniques including the recent Generative Adversarial Networks (GAN) based models and the image steganalysis methods including the Deep Learning opportunities and challenges in stegomalware generation and detection are presented based on our findings.</div>


Sign in / Sign up

Export Citation Format

Share Document