[PDF][PDF] Learning to detect and classify malicious executables in the wild.

JZ Kolter, MA Maloof - Journal of Machine Learning Research, 2006 - jmlr.org
We describe the use of machine learning and data mining to detect and classify malicious
executables as they appear in the wild. We gathered 1,971 benign and 1,651 malicious …

Cobra: Fine-grained malware analysis using stealth localized-executions

A Vasudevan, R Yerraballi - … on Security and Privacy (S&P'06), 2006 - ieeexplore.ieee.org
Fine-grained code analysis in the context of malware is a complex and challenging task that
provides insight into malware code-layers (polymorphic/metamorphic), its data …

N-gram analysis for computer virus detection

DKS Reddy, AK Pujari - Journal in computer virology, 2006 - Springer
Generic computer virus detection is the need of the hour as most commercial antivirus
software fail to detect unknown and new viruses. Motivated by the success of …

New Malicious Code Detection Using Variable Length n-grams

DKS Reddy, SK Dash, AK Pujari - … 2006, Kolkata, India, December 19-21 …, 2006 - Springer
Most of the commercial antivirus software fail to detect unknown and new malicious code. In
order to handle this problem generic virus detection is a viable option. Generic virus detector …

A decision-theoritic, semi-supervised model for intrusion detection

T Lane - Machine learning and data mining for computer …, 2006 - Springer
In this chapter, we develop a model of intrusion detection (IDS) based on semi-supervised
learning. This model attempts to fuse misuse detection with anomaly detection and to exploit …

Towards remote policy enforcement for runtime protection of mobile code using trusted computing

X Zhang, F Parisi-Presicce, R Sandhu - International Workshop on Security, 2006 - Springer
We present an approach to protect mobile code and agents at runtime using Trusted
Computing (TC) technologies. For this purpose, a “mobile policy” is defined by the mobile …

A new approach to hide policy for automated trust negotiation

H Jin, Z Liao, D Zou, W Qiang - International Workshop on Security, 2006 - Springer
Automated trust negotiation (ATN) is an important approach to establish trust between
strangers through the exchange of credentials and access control policies. In practice …

Comparison of users' perception of information security elements on computer virus between large and small-and-medium companies

J Kim, J Jeon - Journal of the Korea Institute of Information Security …, 2006 - koreascience.kr
Computer virus is one of the most common information security problems in the information
age. This study investigates the difference of users' perception of security elements between …

[PDF][PDF] AspectJ assessment from a security perspective

D Alhadidi, N Belblidia, M Debbabi - Concordia Institute for …, 2006 - researchgate.net
1AspectJ is a useful and expressive aspect oriented programming extension to the Java
programming language. This paper addresses the evaluation of AspectJ from a security …

[PDF][PDF] Part II Software Analysis and Assurance

G Vigna, T Reps, G Balakrishnan, J Lim, T Teitelbaum… - pages.cs.wisc.edu
Malicious programs present an increasing threat to the privacy of sensitive data and the
availability of critical services. As Internet connectivity exploded and online services have …