Phantom Malware: Conceal Malicious Actions From Malware Detection Techniques by Imitating User Activity

Autor(en): Witte, Tim Niklas
Stichwörter: BadUSB; Banking; behavior blockers; Computer Science; Computer Science, Information Systems; Engineering; Engineering, Electrical & Electronic; Google; Malware; Microsoft Windows; obfuscation; overlay attacks; Phantoms; ransomware; Telecommunications; Trojan horses; UI redressing; user imitation; User interfaces
Erscheinungsdatum: 2020
Herausgeber: IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
Enthalten in: IEEE ACCESS
Band: 8
Startseite: 164428
Seitenende: 164452
ISSN: 21693536
DOI: 10.1109/ACCESS.2020.3021743

Show full item record

Page view(s)

10
Last Week
0
Last month
2
checked on Dec 12, 2024

Google ScholarTM

Check

Altmetric