Sality

Sality is the classification for a family of malicious software (malware), which infects files on Microsoft Windows systems. Sality was first… (More)
Wikipedia

Topic mentions per year

Topic mentions per year

2012-2016
024620122016

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
The ever-growing number of cyber attacks from botnets has made them one of the biggest threats on the Internet. Thus, it is… (More)
  • figure 1
  • table I
  • table II
  • figure 2
Is this relevant?
2015
2015
Many cyber-crimes, such as Denial of Service (DoS) attacks and banking frauds, originate from botnets. To prevent botnets from… (More)
  • figure 1
Is this relevant?
2015
2015
The decentralized nature of Peer-to-Peer (P2P) botnets precludes traditional takedown strategies, which target dedicated command… (More)
  • figure 1
  • table 1
  • table 2
  • table 3
  • table 4
Is this relevant?
2014
2014
Although Internet scanning is one of the most popular malware propagation methods, sound measurements about its success rate are… (More)
  • figure 1
  • figure 2
  • figure 3
  • table I
  • figure 4
Is this relevant?
2013
2013
Botmasters increasingly encrypt command-and-control (C&C) communication to evade existing intrusion detection systems. Our… (More)
  • table 1
  • figure 1
  • figure 2
  • figure 3
  • table 2
Is this relevant?
2013
2013
Malware often contains many system-resource-sensitive condition checks to avoid any duplicate infection, make sure to obtain… (More)
  • figure 1
  • table I
  • figure 2
  • table II
  • table IV
Is this relevant?
2012
2012
  • Trupti Pawshere
  • 2012
A biometric identification system is an automatic pattern recognition system that recognizes a person by determining the… (More)
Is this relevant?
2012
2012
Analyzing cryptographic implementations has important applications, especially for malware analysis where they are an integral… (More)
  • figure 1
  • figure 3
  • figure 2
  • figure 4
  • figure 5
Is this relevant?
2012
2012
Botnets are the most common vehicle of cyber-criminal activity. They are used for spamming, phishing, denial of service attacks… (More)
  • figure 2
  • figure 1
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2012
2012
We propose a new, active scheme for fast and reliable detection of P2P malware by exploiting the enemies' strength against them… (More)
  • figure 1
  • figure 2
  • figure 3
  • table 1
  • table 2
Is this relevant?