메뉴 건너뛰기




Volumn , Issue , 2013, Pages 559-570

On the feasibility of online malware detection with performance counters

Author keywords

Machine learning; Malware detection; Performance counters

Indexed keywords

ANTI VIRUS; ANTIVIRUS SOFTWARES; HARDWARE MODIFICATIONS; LINUX PLATFORM; MALWARE DETECTION; MOBILE PLATFORM; PERFORMANCE COUNTERS; SYSTEM SOFTWARES;

EID: 84881191238     PISSN: 10636897     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2485922.2485970     Document Type: Conference Paper
Times cited : (389)

References (27)
  • 3
    • 84881150021 scopus 로고    scopus 로고
    • Trend Micro Corporation, "Russian underground.,"
    • Trend Micro Corporation, "Russian underground.,"
  • 4
    • 79957616447 scopus 로고    scopus 로고
    • Stuxnet: Dissecting a cyberwarfare weapon
    • IEEE
    • R. Langner, "Stuxnet: Dissecting a Cyberwarfare Weapon," Security & Privacy, IEEE, Vol. 9, no. 3, pp. 49-51, 2011.
    • (2011) Security & Privacy , vol.9 , Issue.3 , pp. 49-51
    • Langner, R.1
  • 5
    • 84881131204 scopus 로고    scopus 로고
    • SKyWIper: A complex malware for targeted attacks
    • Laboratory of Cryptography and System Security (CrySyS Lab) Budapest University of Technology and Economics, May
    • Laboratory of Cryptography and System Security (CrySyS Lab), "sKyWIper: A Complex Malware for Targeted Attacks," Tech. Rep. v1.05, Budapest University of Technology and Economics, May 2012.
    • (2012) Tech. Rep. V1.05
  • 9
    • 84876950829 scopus 로고    scopus 로고
    • Abusing file processing in malware detectors for fun and profit
    • S. Jana and V. Shmatikov, "Abusing file processing in malware detectors for fun and profit," in IEEE Symposium on Security and Privacy, pp. 80-94, 2012.
    • (2012) IEEE Symposium on Security and Privacy , pp. 80-94
    • Jana, S.1    Shmatikov, V.2
  • 14
    • 0032676506 scopus 로고    scopus 로고
    • A data mining framework for building intrusion detection models
    • W. Lee, S. J. Stolfo, and K. W. Mok, "A data mining framework for building intrusion detection models," in In IEEE Symposium on Security and Privacy, pp. 120-132, 1999.
    • (1999) IEEE Symposium on Security and Privacy , pp. 120-132
    • Lee, W.1    Stolfo, S.J.2    Mok, K.W.3
  • 20
    • 1342324998 scopus 로고    scopus 로고
    • Discovering and exploiting program phases
    • IEEE nov.-dec.
    • T. Sherwood, E. Perelman, G. Hamerly, S. Sair, and B. Calder, "Discovering and exploiting program phases," Micro, IEEE, Vol. 23, pp. 84-93, nov.-dec. 2003.
    • (2003) Micro , vol.23 , pp. 84-93
    • Sherwood, T.1    Perelman, E.2    Hamerly, G.3    Sair, S.4    Calder, B.5
  • 22
    • 84878368035 scopus 로고    scopus 로고
    • Dissecting android malware: Characterization and evolution
    • 2012 IEEE Symp. on may
    • Y. Zhou and X. Jiang, "Dissecting android malware: Characterization and evolution," in Security and Privacy (SP), 2012 IEEE Symp. on, pp. 95-109, may 2012.
    • (2012) Security and Privacy (SP) , pp. 95-109
    • Zhou, Y.1    Jiang, X.2
  • 24
    • 84881126239 scopus 로고    scopus 로고
    • BlackHat Library Mar
    • BlackHat Library, "Jynx rootkit2.0," Mar 2012.
    • (2012) Jynx Rootkit2.0
  • 27
    • 80755169488 scopus 로고    scopus 로고
    • Sice: A hardware-level strongly isolated computing environment for x86 multi-core platforms
    • (New York, NY, USA) ACM
    • A. M. Azab, P. Ning, and X. Zhang, "Sice: a hardware-level strongly isolated computing environment for x86 multi-core platforms," in Proc. of the 18th ACM conf. on Computer and communications security, (New York, NY, USA), pp. 375-388, ACM, 2011.
    • (2011) Proc. of the 18th ACM Conf. on Computer and Communications Security , pp. 375-388
    • Azab, A.M.1    Ning, P.2    Zhang, X.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.