Malware-aware processors: A framework for efficient online malware detection

M Ozsoy, C Donovick, I Gorelik… - 2015 IEEE 21st …, 2015 - ieeexplore.ieee.org
Security exploits and ensuant malware pose an increasing challenge to computing systems
as the variety and complexity of attacks continue to increase. In response, software-based …

A framework for metamorphic malware analysis and real-time detection

S Alam, RN Horspool, I Traore, I Sogukpinar - computers & security, 2015 - Elsevier
Metamorphism is a technique that mutates the binary code using different obfuscations. It is
difficult to write a new metamorphic malware and in general malware writers reuse old …

New malware detection framework based on N-grams and support vector domain description

M El Boujnouni, M Jedra, N Zahid - 2015 11th international …, 2015 - ieeexplore.ieee.org
Malware is a sequence of instructions that has the potential to harm any computer system or
computer network. Thus detecting malware especially new ones is a critical topic in today's …

[图书][B] Intrusion Detection System of industrial control networks using network telemetry

S Ponomarev - 2015 - search.proquest.com
Abstract Industrial Control Systems (ICSs) are designed, implemented, and deployed in
most major spheres of production, business, and entertainment. ICSs are commonly split …

Ensuring application integrity: A survey on techniques and tools

L Catuogno, C Galdi - 2015 9th International Conference on …, 2015 - ieeexplore.ieee.org
This paper aims at offering a compact vision of the main solutions that have been proposed
to address the problem of ensuring the integrity and reliability of applications and executable …

SAM: the static analysis module of the MAVERIC mobile app security verification platform

A Armando, G Bocci, G Chiarelli, G Costa… - … 2015, Held as Part of the …, 2015 - Springer
The tremendous success of the mobile application paradigm is due to the ease with which
new applications are uploaded by developers, distributed through the application markets …

Hardware-assisted malware detection for embedded systems in smart grid

C Li, D Srinivasan, T Reindl - 2015 IEEE Innovative Smart Grid …, 2015 - ieeexplore.ieee.org
In smart grid, demand side management (DSM) became increasingly important to improve
the energy efficiency. It requires sophisticated real-time embedded control systems to …

Secure dynamic software loading and execution using cross component verification

B Min, V Varadharajan - 2015 45th Annual IEEE/IFIP …, 2015 - ieeexplore.ieee.org
In this paper, we propose a cross verification mechanism for secure execution and dynamic
component loading. Our mechanism is based on a combination of code signing and same …

Negative selection algorithm based unknown malware detection model

J Zeng, W Tang - Bio-Inspired Computing--Theories and Applications …, 2015 - Springer
Nowadays, malwares have become one of the most serious security threats for computer
systems and how to detect malwares is a difficult task, especially, unknown malwares …

[图书][B] Architectural support for efficient prevention and detection of malware

M Ozsoy - 2015 - search.proquest.com
Continuous proliferation of malware poses ever-increasing challenges to security of
computer systems. The malware threats can be addressed either by designing systems in a …