Results 1 - 10
of
2,531
Whitepaper: Specification-based Monitoring Question: What is signature-based detection?
, 2008
"... Answer: Signature-based detection is a malware detection approach that identifies a malware instance by the presence at least one byte code pattern present in a database of signatures from known malicious programs. If a program contains a pattern that exists within the database, it is deemed malicio ..."
Abstract
- Add to MetaCart
Answer: Signature-based detection is a malware detection approach that identifies a malware instance by the presence at least one byte code pattern present in a database of signatures from known malicious programs. If a program contains a pattern that exists within the database, it is deemed
Privacy-Preserving Distributed, Automated Signature-Based Detection of New Internet Worms
, 2010
"... This dissertation develops techniques, based on monitoring network traffic, that automate signature generation for wide-spreading malicious payloads such as Internet worms. Fast signature detection is required to achieve effective content-based filtering. The main thesis is that content prevalence a ..."
Abstract
-
Cited by 2 (0 self)
- Add to MetaCart
This dissertation develops techniques, based on monitoring network traffic, that automate signature generation for wide-spreading malicious payloads such as Internet worms. Fast signature detection is required to achieve effective content-based filtering. The main thesis is that content prevalence
Signature Based Detection of User Events for Post-mortem Forensic Analysis
- In Digital Forensics and Cyber Crime
, 2011
"... Abstract. This paper introduces a novel approach to user event reconstruction by showing the practicality of generating and implementing signature-based analysis methods to reconstruct high-level user actions from a collection of low-level traces found during a post-mortem forensic analysis of a sys ..."
Abstract
-
Cited by 2 (1 self)
- Add to MetaCart
Abstract. This paper introduces a novel approach to user event reconstruction by showing the practicality of generating and implementing signature-based analysis methods to reconstruct high-level user actions from a collection of low-level traces found during a post-mortem forensic analysis of a
Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software
- In Network and Distributed Systems Security Symposium
, 2005
"... Software vulnerabilities have had a devastating effect on the Internet. Worms such as CodeRed and Slammer can compromise hundreds of thousands of hosts within hours or even minutes, and cause millions of dollars of damage [32, 51]. To successfully combat these fast automatic Internet attacks, we nee ..."
Abstract
-
Cited by 647 (32 self)
- Add to MetaCart
—semanticanalysis based signature generation. We show that by backtracing the chain of tainted data structure rooted at the detection point, TaintCheck can automatically identify which original flow and which part of the original flow have caused the attack and identify important invariants of the payload that can
SCRAP: Architecture for Signature-Based Protection from Code Reuse Attacks
"... Code Reuse Attacks (CRAs) recently emerged as a new class of security exploits. CRAs construct malicious programs out of small fragments (gadgets) of existing code, thus eliminating the need for code injection. Existing defenses against CRAs often incur large performance overheads or require extensi ..."
Abstract
-
Cited by 4 (2 self)
- Add to MetaCart
extensive binary rewriting and other changes to the system software. In this paper, we examine a signature-based detection of CRAs, where the attack is detected by observing the behavior of programs and detecting the gadget execution patterns. We first demonstrate that naive signature-based defenses can
1 Signature-Based Protection from Code Reuse Attacks
"... Abstract—Code Reuse Attacks (CRAs) recently emerged as a new class of security exploits. CRAs construct malicious programs out of small fragments (gadgets) of existing code, thus eliminating the need for code injection. Existing defenses against CRAs often incur large performance overheads or requir ..."
Abstract
- Add to MetaCart
or require extensive binary rewriting and other changes to the system software. In this paper, we examine a signature-based detection of CRAs, where the attack is detected by observing the behavior of programs and detecting the gadget execution patterns. We first demonstrate that naive signature-based
DETECTING UNDETECTABLE COMPUTER VIRUSES
, 2010
"... Signature-based detection relies on patterns present in viruses and provides a relatively simple and efficient method for detecting known viruses. At present, most anti-virus systems rely primarily on signature detection. Metamorphic viruses are one of the most difficult types of viruses to detect. ..."
Abstract
-
Cited by 2 (0 self)
- Add to MetaCart
Signature-based detection relies on patterns present in viruses and provides a relatively simple and efficient method for detecting known viruses. At present, most anti-virus systems rely primarily on signature detection. Metamorphic viruses are one of the most difficult types of viruses to detect
Signature-based document image retrieval
- in Proc. European Conf. Computer Vision
"... Abstract. As the most pervasive method of individual identification and document authentication, signatures present convincing evidence and provide an important form of indexing for effective document image processing and retrieval in a broad range of applications. In this work, we developed a fully ..."
Abstract
-
Cited by 5 (4 self)
- Add to MetaCart
fully automatic signature-based document image retrieval system that handles: 1) Automatic detection and segmentation of signatures from document images and 2) Translation, scale, and rotation invariant signature matching for document image retrieval. We treat signature retrieval in the unconstrained
Signature-based Multi-Layer Distributed Intrusion Detection System using Mobile Agents
"... Abstract The Internet and computer networks are exposed to an increasing number of security threats. With new types of attacks appearing continually, developing flexible and adaptive security oriented approaches is a severe challenge. Intrusions detection systems ( IDSs) are systems that try to det ..."
Abstract
-
Cited by 2 (0 self)
- Add to MetaCart
to detect attacks as they occur or after the attacks took place. IDSs collect network traffic information from some point on the network or computer system and then use this information to secure the network. In this context, signature-based network intrusion detection techniques are a valuable technology
Detecting Malicious Codes: A Signature-Based Solution
"... Abstract. Malicious codes are one of the most destructive pieces of software that can attack a computer or network. They are self-duplicating and self-propagating, so their behavior is repetitive and automated. Different methods of detecting such attackers have been proposed. The paper is presentin ..."
Abstract
- Add to MetaCart
is presenting a method to detect this software based on the digital signature of the malware. Our aim is to obtain a dedicated detection scheme for different state-of-the-art digital signatures. Such detection scheme should be optimal from performance point of view.
Results 1 - 10
of
2,531