Sciweavers

817 search results - page 6 / 164
» Malware behaviour analysis
Sort
View
KDD
2009
ACM
173views Data Mining» more  KDD 2009»
13 years 12 months ago
Malware detection using statistical analysis of byte-level file content
Commercial anti-virus software are unable to provide protection against newly launched (a.k.a “zero-day”) malware. In this paper, we propose a novel malware detection techniqu...
S. Momina Tabish, M. Zubair Shafiq, Muddassar Faro...
NDSS
2008
IEEE
14 years 1 months ago
HookFinder: Identifying and Understanding Malware Hooking Behaviors
Installing various hooks into the victim system is an important attacking strategy employed by malware, including spyware, rootkits, stealth backdoors, and others. In order to def...
Heng Yin, Zhenkai Liang, Dawn Song
CVPR
2012
IEEE
11 years 9 months ago
Parameterizing interpersonal behaviour with Laban movement analysis - A Bayesian approach
—In this paper we propose a probabilistic model to parameterize human interactive behaviour from human motion. To Support the model taxonomy, we use Laban Movement Analysis (LMA)...
Kamrad Khoshhal Roudposhti, Luís Santos, Ha...
NDSS
2008
IEEE
14 years 1 months ago
Analysis-Resistant Malware
Traditionally, techniques for computing on encrypted data have been proposed with privacy preserving applications in mind. Several current cryptosystems support a homomorphic oper...
John Bethencourt, Dawn Song, Brent Waters
RAID
2010
Springer
13 years 5 months ago
Hybrid Analysis and Control of Malware
Abstract. Malware attacks necessitate extensive forensic analysis efforts that are manual-labor intensive because of the analysis-resistance techniques that malware authors employ....
Kevin A. Roundy, Barton P. Miller