Sciweavers

817 search results - page 12 / 164
» Malware behaviour analysis
Sort
View
IEEESP
2007
85views more  IEEESP 2007»
13 years 7 months ago
Toward Automated Dynamic Malware Analysis Using CWSandbox
Carsten Willems, Thorsten Holz, Felix C. Freiling
WCRE
2009
IEEE
14 years 2 months ago
Automatic Static Unpacking of Malware Binaries
—Current malware is often transmitted in packed or encrypted form to prevent examination by anti-virus software. To analyze new malware, researchers typically resort to dynamic c...
Kevin Coogan, Saumya K. Debray, Tasneem Kaochar, G...
MOBISEC
2009
Springer
14 years 1 months ago
Context-Aware Monitoring of Untrusted Mobile Applications
Abstract. Current measures to enhance the security of untrusted mobile applications require a user to trust the software vendor. They do not guarantee complete protection against t...
Andrew Brown, Mark Ryan
ICSE
2010
IEEE-ACM
14 years 5 days ago
From behaviour preservation to behaviour modification: constraint-based mutant generation
The efficacy of mutation analysis depends heavily on its capability to mutate programs in such a way that they remain executable and exhibit deviating behaviour. Whereas the forme...
Friedrich Steimann, Andreas Thies
ICONIP
2009
13 years 5 months ago
Automated Log Analysis of Infected Windows OS Using Mechanized Reasoning
Malware (Malicious Software) of Windows OS has become more sophisticated. To take some countermeasures for recent infection, more intelligent and automated system log analysis is n...
Ruo Ando