Articles with "responding targeted" as a keyword



Photo by iizanyar from unsplash

Responding to targeted stealthy attacks on Android using timely-captured memory dumps

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Access"

DOI: 10.1109/access.2022.3160531

Abstract: The increasing dominance of Android smartphones for everyday communication and data processing makes long-term stealthy malware an even more dangerous threat. Recent malware campaigns like Flubot demonstrate that by employing stealthy malware techniques even at… read more here.

Keywords: stealthy attacks; responding targeted; malware; evidence ... See more keywords