2019
DOI: 10.1007/978-3-030-29029-0_28
|View full text |Cite
|
Sign up to set email alerts
|

Blockchain-Based Malware Detection Method Using Shared Signatures of Suspected Malware Files

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
13
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 12 publications
(13 citation statements)
references
References 6 publications
0
13
0
Order By: Relevance
“…With the aim of preventing the attacks affecting users' privacy, many works investigated the use of blockchain technologies [130], [131], [132], [133]. In essence, the blockchain ensures secure and reliable storing and sharing of signatures as well as a framework for using them for detection duties.…”
Section: E Bio-inspired and Other Detection Methodsmentioning
confidence: 99%
“…With the aim of preventing the attacks affecting users' privacy, many works investigated the use of blockchain technologies [130], [131], [132], [133]. In essence, the blockchain ensures secure and reliable storing and sharing of signatures as well as a framework for using them for detection duties.…”
Section: E Bio-inspired and Other Detection Methodsmentioning
confidence: 99%
“…Ryusei Fuji et al 25 developed blockchain‐assisted malware discovery technique which utilized shared signatures of alleged malware files. This technique shared signatures of alleged files amongst the users thereby allows it to quickly respond to maximize the suspicious threats.…”
Section: Motivationsmentioning
confidence: 99%
“…The aforementioned strategies help to determine unknown malware which could not be determined by signature‐based strategies. Heuristic strategies are strategies which determine malware using machine learning and data mining strategies 25 …”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Ryusei et al [37] proposed a blockchain-based malware file detection method. Their proposal seeks to exploit certain blockchain functionalities, specifically the immutability of stored data and the robustness of consensus management.…”
Section: Related Studies-attack Detection Techniquesmentioning
confidence: 99%