Employing Program Semantics for Malware Detection

作者: Smita Naval , Vijay Laxmi , Muttukrishnan Rajarajan , Manoj Singh Gaur , Mauro Conti

DOI: 10.1109/TIFS.2015.2469253

关键词:

摘要: … effective system-call based malware detection approach that is resistant to system-call injection … traces, one possible evasion technique to thwart our model is systemcall injection attack. …

参考文章(51)
Yuede Ji, Yukun He, Dewei Zhu, Qiang Li, Dong Guo, A Mulitiprocess Mechanism of Evading Behavior-Based Bot Detection Approaches information security practice and experience. pp. 75- 89 ,(2014) , 10.1007/978-3-319-06320-1_7
Guillermo Suarez-Tangil, Mauro Conti, Juan E. Tapiador, Pedro Peris-Lopez, Detecting Targeted Smartphone Malware with Behavior-Triggering Stochastic Models european symposium on research in computer security. ,vol. 8712, pp. 183- 201 ,(2014) , 10.1007/978-3-319-11203-9_11
Thomas Barabosch, Sebastian Eschweiler, Elmar Gerhards-Padilla, Bee Master: Detecting Host-Based Code Injection Attacks international conference on detection of intrusions and malware, and vulnerability assessment. pp. 235- 254 ,(2014) , 10.1007/978-3-319-08509-8_13
Martina Lindorfer, Clemens Kolbitsch, Paolo Milani Comparetti, Detecting Environment-Sensitive Malware Lecture Notes in Computer Science. pp. 338- 357 ,(2011) , 10.1007/978-3-642-23644-0_18
Smita Naval, Vijay Laxmi, Manoj S. Gaur, Sachin Raja, Muttukrishnan Rajarajan, Mauro Conti, Environment–Reactive Malware Behavior: Detection and Categorization DPM/SETOP/QASA. pp. 167- 182 ,(2014) , 10.1007/978-3-319-17016-9_11
Alexandros Kapravelos, Yan Shoshitaishvili, Marco Cova, Christopher Kruegel, Giovanni Vigna, None, Revolver: an automated approach to the detection of evasiveweb-based malware usenix security symposium. pp. 637- 652 ,(2013)
Christopher Kruegel, Ralf Hund, Thorsten Holz, Gregoire Jacob, JACKSTRAWS: picking command and control connections from bot traffic usenix security symposium. pp. 29- 29 ,(2011)
Konrad Rieck, Thorsten Holz, Carsten Willems, Patrick Düssel, Pavel Laskov, Learning and Classification of Malware Behavior international conference on detection of intrusions and malware and vulnerability assessment. pp. 108- 125 ,(2008) , 10.1007/978-3-540-70542-0_6
Horst Bunke, P. Foggia, C. Guidobaldi, M. Vento, Graph clustering using the weighted minimum common supergraph Lecture Notes in Computer Science. pp. 235- 246 ,(2003) , 10.1007/3-540-45028-9_21
Yongzheng Wu, Roland H. C. Yap, Experiments with malware visualization international conference on detection of intrusions and malware and vulnerability assessment. pp. 123- 133 ,(2012) , 10.1007/978-3-642-37300-8_7