Sciweavers

57 search results - page 2 / 12
» A semantics-based approach to malware detection
Sort
View
ACSAC
2006
IEEE
14 years 5 months ago
PolyUnpack: Automating the Hidden-Code Extraction of Unpack-Executing Malware
Modern malware often hide the malicious portion of their program code by making it appear as data at compiletime and transforming it back into executable code at runtime. This obf...
Paul Royal, Mitch Halpin, David Dagon, Robert Edmo...
ICC
2009
IEEE
164views Communications» more  ICC 2009»
13 years 8 months ago
Static Analysis of Executables for Collaborative Malware Detection on Android
Smartphones are getting increasingly popular and several malwares appeared targeting these devices. General countermeasures to smartphone malwares are currently limited to signatur...
Aubrey-Derrick Schmidt, Rainer Bye, Hans-Gunther S...
ACSAC
2007
IEEE
14 years 5 months ago
HoneyIM: Fast Detection and Suppression of Instant Messaging Malware in Enterprise-Like Networks
Instant messaging (IM) has been one of most frequently used malware attack vectors due to its popularity. Distinct from other malware, it is straightforward for IM malware to fin...
Mengjun Xie, Zhenyu Wu, Haining Wang
TACAS
2012
Springer
275views Algorithms» more  TACAS 2012»
12 years 6 months ago
Pushdown Model Checking for Malware Detection
The number of malware is growing extraordinarily fast. Therefore, it is important to have efficient malware detectors. Malware writers try to obfuscate their code by different tec...
Fu Song, Tayssir Touili
CCS
2008
ACM
14 years 26 days ago
Ether: malware analysis via hardware virtualization extensions
Malware has become the centerpiece of most security threats on the Internet. Malware analysis is an essential technology that extracts the runtime behavior of malware, and supplie...
Artem Dinaburg, Paul Royal, Monirul I. Sharif, Wen...