Semantics-Based Online Malware Detection: Towards Efficient Real-Time Protection Against Malware
暂无分享,去创建一个
Wei Zhang | Yang Liu | Mahinthan Chandramohan | Sanjeev Das | Wei Zhang | Mahinthan Chandramohan | Sanjeev Das | Yang Liu
[1] Tal Garfinkel,et al. A Virtual Machine Introspection Based Architecture for Intrusion Detection , 2003, NDSS.
[2] Mark Stamp,et al. Opcode graph similarity and metamorphic detection , 2012, Journal in Computer Virology.
[3] Lionel C. Briand,et al. A scalable approach for malware detection through bounded feature space behavior modeling , 2013, 2013 28th IEEE/ACM International Conference on Automated Software Engineering (ASE).
[4] Christopher Krügel,et al. Limits of Static Analysis for Malware Detection , 2007, Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007).
[5] Wenke Lee,et al. Ether: malware analysis via hardware virtualization extensions , 2008, CCS.
[6] Jiankun Hu,et al. A Semantic Approach to Host-Based Intrusion Detection Systems Using Contiguousand Discontiguous System Call Patterns , 2014, IEEE Transactions on Computers.
[7] James Newsome,et al. Dynamic Taint Analysis for Automatic Detection, Analysis, and SignatureGeneration of Exploits on Commodity Software , 2005, NDSS.
[8] Somesh Jha,et al. Mining specifications of malicious behavior , 2008, ISEC '08.
[9] Christopher Krügel,et al. Scalable, Behavior-Based Malware Clustering , 2009, NDSS.
[10] Jun Sun,et al. Detection and classification of malicious JavaScript via attack behavior modelling , 2015, ISSTA.
[11] Lilian Bossuet,et al. Dynamically configurable security for SRAM FPGA bitstreams , 2004, 18th International Parallel and Distributed Processing Symposium, 2004. Proceedings..
[12] Ahmad-Reza Sadeghi,et al. Hardware-assisted fine-grained control-flow integrity: Towards efficient protection of embedded systems against software exploitation , 2014, 2014 51st ACM/EDAC/IEEE Design Automation Conference (DAC).
[13] Hovav Shacham,et al. The geometry of innocent flesh on the bone: return-into-libc without function calls (on the x86) , 2007, CCS '07.
[14] Ramesh Karri,et al. NumChecker: Detecting kernel control-flow modifying rootkits by using Hardware Performance Counters , 2013, 2013 50th ACM/EDAC/IEEE Design Automation Conference (DAC).
[15] Ruby B. Lee,et al. Runtime execution monitoring (REM) to detect and prevent malicious code execution , 2004, IEEE International Conference on Computer Design: VLSI in Computers and Processors, 2004. ICCD 2004. Proceedings..
[16] Hessam Kooti,et al. Hardware-Assisted Detection of Malicious Software in Embedded Systems , 2012, IEEE Embedded Systems Letters.
[17] Kangbin Yim,et al. Malware Obfuscation Techniques: A Brief Survey , 2010, 2010 International Conference on Broadband, Wireless Computing, Communication and Applications.
[18] Konrad Rieck,et al. Structural detection of android malware using embedded call graphs , 2013, AISec.
[19] Ian H. Witten,et al. The WEKA data mining software: an update , 2009, SKDD.
[20] Shawki Areibi,et al. The Impact of Arithmetic Representation on Implementing MLP-BP on FPGAs: A Study , 2007, IEEE Transactions on Neural Networks.
[21] Christopher Krügel,et al. A survey on automated dynamic malware-analysis techniques and tools , 2012, CSUR.
[22] Mahdi Abadi,et al. HPCMalHunter: Behavioral malware detection using hardware performance counters and singular value decomposition , 2014, 2014 4th International Conference on Computer and Knowledge Engineering (ICCKE).
[23] HuJiankun,et al. A Semantic Approach to Host-Based Intrusion Detection Systems Using Contiguousand Discontiguous System Call Patterns , 2014 .
[24] Muddassar Farooq,et al. IMAD: in-execution malware analysis and detection , 2009, GECCO.
[25] Nael B. Abu-Ghazaleh,et al. Malware-aware processors: A framework for efficient online malware detection , 2015, 2015 IEEE 21st International Symposium on High Performance Computer Architecture (HPCA).
[26] Salvatore J. Stolfo,et al. On the feasibility of online malware detection with performance counters , 2013, ISCA.
[27] Yoseba K. Penya,et al. Idea: Opcode-Sequence-Based Malware Detection , 2010, ESSoS.
[28] Yutao Liu,et al. CFIMon: Detecting violation of control flow integrity using performance counters , 2012, IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2012).
[29] Stefano Zanero,et al. Detecting Intrusions through System Call Sequence and Argument Analysis , 2010, IEEE Transactions on Dependable and Secure Computing.
[30] Wei Zhang,et al. Reconfigurable Dynamic Trusted Platform Module for Control Flow Checking , 2014, 2014 IEEE Computer Society Annual Symposium on VLSI.
[31] Christopher Krügel,et al. A quantitative study of accuracy in system call-based malware detection , 2012, ISSTA 2012.
[32] Angelos D. Keromytis,et al. Transparent ROP Exploit Mitigation Using Indirect Branch Tracing , 2013, USENIX Security Symposium.
[33] Christopher Krügel,et al. AccessMiner: using system-centric models for malware protection , 2010, CCS '10.
[34] Ramesh Karri,et al. A high-performance, low-overhead microarchitecture for secure program execution , 2012, 2012 IEEE 30th International Conference on Computer Design (ICCD).
[35] Christopher Krügel,et al. Dynamic Analysis of Malicious Code , 2006, Journal in Computer Virology.
[36] Salvatore J. Stolfo,et al. Unsupervised Anomaly-Based Malware Detection Using Hardware Features , 2014, RAID.
[37] Zhenkai Liang,et al. Jump-oriented programming: a new class of code-reuse attack , 2011, ASIACCS '11.
[38] Daniel Bilar,et al. Opcodes as predictor for malware , 2007, Int. J. Electron. Secur. Digit. Forensics.
[39] Stephanie Forrest,et al. A sense of self for Unix processes , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.
[40] Divya ARORAa,et al. Architectural Enhancements for Secure Embedded Processing , 2006 .
[41] Igor Santos,et al. Opcode sequences as representation of executables for data-mining-based unknown malware detection , 2013, Inf. Sci..
[42] Ramesh Karri,et al. A Survey of Microarchitecture Support for Embedded Processor Security , 2012, 2012 IEEE Computer Society Annual Symposium on VLSI.
[43] Dan Boneh,et al. Architectural support for copy and tamper resistant software , 2000, SIGP.
[44] Xu Chen,et al. Towards an understanding of anti-virtualization and anti-debugging behavior in modern malware , 2008, 2008 IEEE International Conference on Dependable Systems and Networks With FTCS and DCC (DSN).
[45] Arati Baliga,et al. Rootkits on smart phones: attacks, implications and opportunities , 2010, HotMobile '10.