Behavior based signatures

作者: Spencer Dale Smith , Adam Glick , Nicholas Robert Graf

DOI:

关键词:

摘要: Behavior based signatures for identifying applications are generated. An application is monitored as it runs. Specific behaviors concerning the execution of detected, and a behavior signature representing detected created, such that can be used subsequently to identify instances application. known malicious and/or non-malicious determine whether other comprise malware. To do so, running monitored, specific detected. The compared one or more signatures. Responsive match, signature, determined comprises additional malware detection test, heuristic analysis, also performed in determining

参考文章(4)
Bahman Mahbod, Samuel Yie, Jayaraman Manni, Muhammad Amin, Osman Abdoul Ismael, Detecting Malicious Network Content Using Virtual Environment Components ,(2009)
Bing Liu, Threat protection network ,(2005)
Alexey V. Monastyrsky, Mikhail A. Pavlyushchik, Andrey V. Sobko, System and method for detecting multi-component malware ,(2007)