Sciweavers

817 search results - page 8 / 164
» Malware behaviour analysis
Sort
View
NDSS
2009
IEEE
14 years 2 months ago
Scalable, Behavior-Based Malware Clustering
Anti-malware companies receive thousands of malware samples every day. To process this large quantity, a number of automated analysis tools were developed. These tools execute a m...
Ulrich Bayer, Paolo Milani Comparetti, Clemens Hla...
COMPSEC
2008
113views more  COMPSEC 2008»
13 years 7 months ago
Automated containment of rootkits attacks
Abstract-- Rootkit attacks are a serious threat to computer systems. Packaged with other malware such as worms, viruses and spyware, rootkits pose a more potent threat than ever be...
Arati Baliga, Liviu Iftode, Xiaoxin Chen
SP
2007
IEEE
135views Security Privacy» more  SP 2007»
14 years 1 months ago
Exploring Multiple Execution Paths for Malware Analysis
Malicious code (or malware) is defined as software that fulfills the deliberately harmful intent of an attacker. Malware analysis is the process of determining the behavior and ...
Andreas Moser, Christopher Krügel, Engin Kird...
VIROLOGY
2011
57views more  VIROLOGY 2011»
13 years 2 months ago
Improving antivirus accuracy with hypervisor assisted analysis
Modern malware protection systems bring an especially difficult problem to antivirus scanners. Simple obfuscationmethodscandiminishtheeffectivenessofascanner significantly, oftent...
Daniel Quist, Lorie M. Liebrock, Joshua Neil
NBIS
2010
Springer
13 years 5 months ago
Mining Association Rules Consisting of Download Servers from Distributed Honeypot Observation
This paper aims to find interested association rules, known as data mining technique, out of the dataset of downloading logs by focusing on the coordinated activity among downloadi...
Masayuki Ohrui, Hiroaki Kikuchi, Masato Terada