Phantom Malware: Conceal Malicious Actions From Malware Detection Techniques by Imitating User Activity
Autor(en): | Witte, Tim Niklas | Stichwörter: | BadUSB; Banking; behavior blockers; Computer Science; Computer Science, Information Systems; Engineering; Engineering, Electrical & Electronic; Google; Malware; Microsoft Windows; obfuscation; overlay attacks; Phantoms; ransomware; Telecommunications; Trojan horses; UI redressing; user imitation; User interfaces | Erscheinungsdatum: | 2020 | Herausgeber: | IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC | Enthalten in: | IEEE ACCESS | Band: | 8 | Startseite: | 164428 | Seitenende: | 164452 | ISSN: | 21693536 | DOI: | 10.1109/ACCESS.2020.3021743 |
Show full item record