메뉴 건너뛰기




Volumn 9, Issue 2, 2014, Pages 196-207

Growing grapes in your computer to defend against malware

Author keywords

behavior; Malware detection; OS level information flow

Indexed keywords

BEHAVIOR; BEHAVIOR TEMPLATES; BEHAVIOR-BASED DETECTION; COMBINATORIAL OPTIMIZATION ALGORITHM; FALSE POSITIVE RATES; INFORMATION FLOWS; MALWARE DETECTION; PERFORMANCE IMPACT;

EID: 84893366993     PISSN: 15566013     EISSN: None     Source Type: Journal    
DOI: 10.1109/TIFS.2013.2291066     Document Type: Article
Times cited : (26)

References (35)
  • 1
    • 77955210614 scopus 로고    scopus 로고
    • Synthesizing near-optimal malware specifications from suspicious behaviors
    • Privacy, Berkeley, CA, USA, Apr.
    • M. Fredrikson, S. Jha, M. Christodorescu, R. Sailer, and X. Yan, "Synthesizing near-optimal malware specifications from suspicious behaviors," in Proc. IEEE Symp. Sec. Privacy, Berkeley, CA, USA, Apr. 2010, pp. 45-60.
    • (2010) Proc. IEEE Symp. Sec. , pp. 45-60
    • Fredrikson, M.1    Jha, S.2    Christodorescu, M.3    Sailer, R.4    Yan, X.5
  • 2
    • 78650024495 scopus 로고    scopus 로고
    • AccessMiner: Using system-centric models for malware protection
    • Chicago, IL, USA, Oct.
    • A. Lanzi, D. Balzarotti, C. Kruegel, M. Christodorescu, and E. Kirda, "AccessMiner: Using system-centric models for malware protection," in Proc. 17th ACM CCS, Chicago, IL, USA, Oct. 2010, pp. 399-412.
    • (2010) Proc. 17th ACM CCS , pp. 399-412
    • Lanzi, A.1    Balzarotti, D.2    Kruegel, C.3    Christodorescu, M.4    Kirda, E.5
  • 6
    • 84893343626 scopus 로고    scopus 로고
    • Dec. 10 [Online]. Available
    • (2013, Dec. 10). Microsoft Security Bulletins [Online]. Available: http://www.microsoft.com/technet/security/current.aspx
    • (2013) Microsoft Security Bulletins
  • 7
    • 84893345225 scopus 로고    scopus 로고
    • Symantec Inc., Mountain View, CA USA. (2012 Aug.) [Online].Available
    • Symantec, Inc., Mountain View, CA, USA. (2012, Aug.). Threats List [Online]. Available: http://www.symantec.com/business/security-response/ threatexplorer/threats.jsp
    • Threats List
  • 9
    • 84882800335 scopus 로고    scopus 로고
    • Simple, state based approaches to program-based anomaly detection
    • Aug.
    • C. C. Michael and A. Ghosh, "Simple, state based approaches to program-based anomaly detection," ACM Trans. Inf. Syst. Sec., vol. 5, no. 3, pp. 203-237, Aug. 2002.
    • (2002) ACM Trans. Inf. Syst. Sec. , vol.5 , Issue.3 , pp. 203-237
    • Michael, C.C.1    Ghosh, A.2
  • 10
    • 21644490164 scopus 로고    scopus 로고
    • Backtracking intrusions
    • SOSP'03: Proceedings of the 19th ACM Symposium on Operating Systems Principles
    • S. T. King and P. M. Chen, "Backtracking intrusions," in Proc. ACM Symp. Oper. Syst. Principles, 2003, pp. 223-236. (Pubitemid 40929699)
    • (2003) Operating Systems Review (ACM) , vol.37 , Issue.5 , pp. 223-236
    • King, S.T.1    Chen, P.M.2
  • 12
    • 0032313923 scopus 로고    scopus 로고
    • Intrusion detection using sequences of system calls
    • Jan.
    • S. A. Hofmeyr, S. Forrest, and A. Somayaji, "Intrusion detection using sequences of system calls," J. Comput. Sec., vol. 6, no. 3, pp. 151-180, Jan. 1998.
    • (1998) J. Comput. Sec. , vol.6 , Issue.3 , pp. 151-180
    • Hofmeyr, S.A.1    Forrest, S.2    Somayaji, A.3
  • 13
    • 85084163349 scopus 로고    scopus 로고
    • Data mining approaches for intrusion detection
    • W. Lee and S. J. Stolfo, "Data mining approaches for intrusion detection," in Proc. 7th USENIX Sec. Symp., vol. 7. 1998, pp. 1-6.
    • (1998) Proc. 7th USENIX Sec. Symp. , vol.7 , pp. 1-6
    • Lee, W.1    Stolfo, S.J.2
  • 15
    • 33745463455 scopus 로고    scopus 로고
    • Learning classifiers for isuse and anomaly detection using a bag of system calls representation
    • IAW, Jan.
    • D. Kang, D. Fuller, and V. Honavar, "Learning classifiers for isuse and anomaly detection using a bag of system calls representation," in Proc. 6th IEEE Syst. Man Cybern. IAW, Jan. 2005, pp. 1-8.
    • (2005) Proc. 6th IEEE Syst. Man Cybern , pp. 1-8
    • Kang, D.1    Fuller, D.2    Honavar, V.3
  • 18
    • 84893425040 scopus 로고    scopus 로고
    • Design, implementation, and evaluation of repairable file service
    • N. Zhu and T. Chiueh. "Design, implementation, and evaluation of repairable file service," in Proc. 21st ICDE, 2003, pp. 1024-1035.
    • (2003) Proc. 21st ICDE , pp. 1024-1035
    • Zhu, N.1    Chiueh, T.2
  • 19
    • 84893398954 scopus 로고    scopus 로고
    • Nov. 13 [Online]. Available
    • (2013, Nov. 13). Offensive Computing [Online]. Available: http://www.offensivecomputing.net/
    • (2013) Offensive Computing
  • 22
    • 77950788046 scopus 로고    scopus 로고
    • Panorama: Capturing system-wide information flow for malware detection and analysis
    • CCS, Oct.
    • H. Yin, D. Song, M. Egele, C. Kruegel, and E. Kirda, "Panorama: Capturing system-wide information flow for malware detection and analysis," in Proc. 14th ACM Conf. CCS, Oct. 2007, pp. 116-127.
    • (2007) Proc. 14th ACM Conf , pp. 116-127
    • Yin, H.1    Song, D.2    Egele, M.3    Kruegel, C.4    Kirda, E.5
  • 27
    • 70350626575 scopus 로고    scopus 로고
    • Defending browsers against drive-by downloads: Mitigating heap-spraying code injection attacks
    • Vulnerabil. Assessment, Como, Italy Jul.
    • M. Egele, P. Wurzinger, C. Kruegel, and E. Kirda, "Defending browsers against drive-by downloads: Mitigating heap-spraying code injection attacks," in Proc. 6th Int. Conf. Detection Intrusions Malware, Vulnerabil. Assessment, Como, Italy, Jul. 2009, pp. 88-106.
    • (2009) Proc. 6th Int. Conf. Detection Intrusions Malware , pp. 88-106
    • Egele, M.1    Wurzinger, P.2    Kruegel, C.3    Kirda, E.4
  • 31
    • 34548763868 scopus 로고    scopus 로고
    • Usable mandatory integrity protection for operating systems
    • N. Li, Z. Mao, and H. Chen, "Usable mandatory integrity protection for operating systems," in Proc. IEEE Symp. Sec. Privacy, 2007, pp. 1-15.
    • (2007) Proc. IEEE Symp. Sec. Privacy , pp. 1-15
    • Li, N.1    Mao, Z.2    Chen, H.3
  • 33
    • 57349125651 scopus 로고    scopus 로고
    • Behavioral detection of malware on mobile handsets
    • Services, Breckenridge, CO, USA Jun.
    • A. Bose, X. Hu, K. G. Shin, and T. Park, "Behavioral detection of malware on mobile handsets," in Proc. 6th Int. Conf. Mobile Syst., Appl., Services, Breckenridge, CO, USA, Jun. 2008, pp. 225-238.
    • (2008) Proc. 6th Int. Conf. Mobile Syst., Appl , pp. 225-238
    • Bose, A.1    Hu, X.2    Shin, K.G.3    Park, T.4
  • 35
    • 84875048225 scopus 로고    scopus 로고
    • PC Magazine, New York, NY USA [Online].Available
    • PC Magazine, New York, NY, USA. (2013). PC Magazine Benchmarks [Online]. Available: http://www.pcmag.com/encyclopedia-term/0,2542,t=WebBenchi=48947,00. asp
    • (2013) PC Magazine Benchmarks


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.