Sciweavers

ICC
2009
IEEE
164views Communications» more  ICC 2009»
13 years 10 months ago
Static Analysis of Executables for Collaborative Malware Detection on Android
Smartphones are getting increasingly popular and several malwares appeared targeting these devices. General countermeasures to smartphone malwares are currently limited to signatur...
Aubrey-Derrick Schmidt, Rainer Bye, Hans-Gunther S...
RAID
2010
Springer
13 years 10 months ago
Using IRP for Malware Detection
Abstract. Run-time malware detection strategies are efficient and robust, which get more and more attention. In this paper, we use I/O Request Package (IRP) sequences for malware d...
FuYong Zhang, DeYu Qi, JingLin Hu
CMS
2010
207views Communications» more  CMS 2010»
14 years 19 days ago
Statistical Detection of Malicious PE-Executables for Fast Offline Analysis
While conventional malware detection approaches increasingly fail, modern heuristic strategies often perform dynamically, which is not possible in many applications due to related ...
Ronny Merkel, Tobias Hoppe, Christian Krätzer...
AUSDM
2008
Springer
225views Data Mining» more  AUSDM 2008»
14 years 2 months ago
Evaluation of Malware clustering based on its dynamic behaviour
Malware detection is an important problem today. New malware appears every day and in order to be able to detect it, it is important to recognize families of existing malware. Dat...
Ibai Gurrutxaga, Olatz Arbelaitz, Jesús M. ...
ACSAC
2004
IEEE
14 years 4 months ago
Static Analyzer of Vicious Executables (SAVE)
Software security assurance and malware (trojans, worms, and viruses, etc.) detection are important topics of information security. Software obfuscation, a general technique that ...
Andrew H. Sung, Jianyun Xu, Patrick Chavez, Sriniv...
EUROCAST
2007
Springer
161views Hardware» more  EUROCAST 2007»
14 years 4 months ago
Using Verification Technology to Specify and Detect Malware
Abstract. Computer viruses and worms are major threats for our computer infrastructure, and thus, for economy and society at large. Recent work has demonstrated that a model checki...
Andreas Holzer, Johannes Kinder, Helmut Veith
SP
2005
IEEE
131views Security Privacy» more  SP 2005»
14 years 6 months ago
Semantics-Aware Malware Detection
A malware detector is a system that attempts to determine whether a program has malicious intent. In order to evade detection, malware writers (hackers) frequently use obfuscation...
Mihai Christodorescu, Somesh Jha, Sanjit A. Seshia...
CCS
2007
ACM
14 years 6 months ago
Stealthy malware detection through vmm-based "out-of-the-box" semantic view reconstruction
An alarming trend in malware attacks is that they are armed with stealthy techniques to detect, evade, and subvert malware detection facilities of the victim. On the defensive sid...
Xuxian Jiang, Xinyuan Wang, Dongyan Xu
RAID
2009
Springer
14 years 7 months ago
VirusMeter: Preventing Your Cellphone from Spies
Due to the rapid advancement of mobile communication technology, mobile devices nowadays can support a variety of data services that are not traditionally available. With the growi...
Lei Liu, Guanhua Yan, Xinwen Zhang, Songqing Chen
ISW
2009
Springer
14 years 7 months ago
Peer-to-Peer Architecture for Collaborative Intrusion and Malware Detection on a Large Scale
Abstract. The complexity of modern network architectures and the epidemic diffusion of malware require collaborative approaches for defense. We present a novel distributed system ...
Mirco Marchetti, Michele Messori, Michele Colajann...