Results 1 - 10
of
1,182
Semantics-Aware Malware Detection
- IN IEEE SYMPOSIUM ON SECURITY AND PRIVACY
, 2005
"... A malware detector is a system that attempts to determine whether a program has malicious intent. In order to evade detection, malware writers (hackers) frequently use obfuscation to morph malware. Malware detectors that use a pattern matching approach (such as commercial virus scanners) are suscept ..."
Abstract
-
Cited by 201 (15 self)
- Add to MetaCart
A malware detector is a system that attempts to determine whether a program has malicious intent. In order to evade detection, malware writers (hackers) frequently use obfuscation to morph malware. Malware detectors that use a pattern matching approach (such as commercial virus scanners
“MOBILE MALWARE DETECTION TECHNIQUES”
"... Abstract — The malware threat for mobile phones is expected to increase with the functionality enhancement of mobile phones. This threat is exacerbated with the surge in population of smart phones instilled with stable Internet access which provides attractive targets for malware developers. Current ..."
Abstract
- Add to MetaCart
. From this perspective, we propose and analyze some potential limitation-oriented techniques for effective malware detection and prevention on mobile phones. Keywords-Mobile Malware; Malware Detection; android malware; I.
Deployable classifiers for malware detection
"... The application of machine learning methods to malware detection has opened up possibilities of generating large number of classifiers that use different kinds of features and learning algorithms. A straightforward way to select the best classifier is to pick the one with best holdout or cross-valid ..."
Abstract
- Add to MetaCart
The application of machine learning methods to malware detection has opened up possibilities of generating large number of classifiers that use different kinds of features and learning algorithms. A straightforward way to select the best classifier is to pick the one with best holdout or cross
Traffic aggregation for malware detection
, 2008
"... Stealthy malware, such as botnets and spyware, are hard to detect because their activities are subtle and do not disrupt the network, in contrast to DoS attacks and aggressive worms. Stealthy malware, however, does communicate to exfiltrate data to the attacker, to receive the attacker’s commands, ..."
Abstract
-
Cited by 56 (4 self)
- Add to MetaCart
Stealthy malware, such as botnets and spyware, are hard to detect because their activities are subtle and do not disrupt the network, in contrast to DoS attacks and aggressive worms. Stealthy malware, however, does communicate to exfiltrate data to the attacker, to receive the attacker’s commands
INTELLIGENT MALWARE DETECTION SYSTEM
"... Malware is software designed to infiltrate or damage a computer system without the owner's informed consent. It is considered malware based on the perceived intent of the creator rather than any particular features. Malware is generally the source of spam, phishing, denial of service attacks, b ..."
Abstract
- Add to MetaCart
, botnets, and worms. Malicious programs spy on users ’ behavior and compromise their privacy. Unfortunately, existing techniques for detecting malware and analyzing unknown code samples are insufficient and have significant shortcomings. We observe that malicious information access and processing behavior
Malware Detection Techniques in Android
"... Mobile Phones have become an important need of today. The term mobile phone and smart phone are almost identical now-a-days. Smartphone market is booming with very high speed. Smartphones have gained such a huge popularity due to wide range of capabilities they offer. Currently android platform is l ..."
Abstract
- Add to MetaCart
technique will be introduced to detect malware. This technique detects malware in android applications through machine learning classifier by using both static and dynamic analysis. This technique does not rely on malware signatures for static analysis but instead android permission model is used. Under
Voting Methods For Malware Detection
"... Abstract-The internet plays an important role in all areas of society from economy to the government. Nowadays Computer Security is pretentious by malicious data. Computer security means keeping the information on computer in a secure manner. so detection of malware is an paramount substance. In an ..."
Abstract
- Add to MetaCart
Abstract-The internet plays an important role in all areas of society from economy to the government. Nowadays Computer Security is pretentious by malicious data. Computer security means keeping the information on computer in a secure manner. so detection of malware is an paramount substance
On rootkit and malware detection in smartphones
- in Dependable Systems and Networks Workshops (DSN-W), 2010 International Conference on. 2010
"... Dramatic increase in smartphone sales and third-party applications that users can download has significantly increased the possibility of rootkits and malware targeted for smartphones. This paper discusses the current state of research in detection and mitigation of propagation of malicious code, su ..."
Abstract
-
Cited by 2 (0 self)
- Add to MetaCart
Dramatic increase in smartphone sales and third-party applications that users can download has significantly increased the possibility of rootkits and malware targeted for smartphones. This paper discusses the current state of research in detection and mitigation of propagation of malicious code
Semantic Malware Detection
, 2010
"... Polymorphic and metamorphic malware use code obfuscation techniques to construct new variants which preserve the semantics of the original but change the code syntax, evading current compiled code based detection methods. Dynamic slicing is a technique that, given a variable of interest within a pro ..."
Abstract
-
Cited by 1 (0 self)
- Add to MetaCart
Polymorphic and metamorphic malware use code obfuscation techniques to construct new variants which preserve the semantics of the original but change the code syntax, evading current compiled code based detection methods. Dynamic slicing is a technique that, given a variable of interest within a
Behavior-based Malware Detection
"... I would like to thank my advisor Dr. Thomas Stibor for fruitful discussion and helpful advice. Moreover I would like to thank my family for continuous support. Within the thesis, an environment for gathering behavior data of Windows XP processes is developed. The behavior data consists of parameteri ..."
Abstract
- Add to MetaCart
I would like to thank my advisor Dr. Thomas Stibor for fruitful discussion and helpful advice. Moreover I would like to thank my family for continuous support. Within the thesis, an environment for gathering behavior data of Windows XP processes is developed. The behavior data consists of parameterized system calls to the Win32 API of benign and malicious processes. The collection of the behavior data involves both specially designed user and kernel mode modules in a virtualized Windows XP system as well as an external java program controlling the experiments. The data is gathered using code that is automatically generated by a parser reading the Microsoft Windows SDK. The parser was specially built for this process and is based on the Microsoft C language grammar. The Windows SDK contains some extensions to the C language to make interface annotations. These interface annotations describe each parameter of a function in detail. The code generator is using all this information to prepare the gathering of function traces.
Results 1 - 10
of
1,182