Protecting software through obfuscation: Can it keep pace with progress in code analysis?

S Schrittwieser, S Katzenbeisser, J Kinder… - Acm computing surveys …, 2016 - dl.acm.org
Software obfuscation has always been a controversially discussed research area. While
theoretical results indicate that provably secure obfuscation in general is impossible, its …

Malware detection in pdf and office documents: A survey

P Singh, S Tapaswi, S Gupta - Information Security Journal: A …, 2020 - Taylor & Francis
In 2018, with the internet being treated as a utility on equal grounds as clean water or air, the
underground malicious software economy is flourishing with an influx of growth and …

Methods, systems, and media for detecting covert malware

BM Bowen, PV Prabhu, VP Kemerlis… - US Patent …, 2013 - Google Patents
Methods, systems, and media for detecting covert malware are provided. In accordance with
some embodiments, a method for detecting covert malware in a computing environ ment is …

Systems, methods, and media for detecting network anomalies using a trained probabilistic model

Y Song, AD Keromytis, SJ Stolfo - US Patent 8,844,033, 2014 - Google Patents
Abstract Systems, methods, and media for detecting network anomalies are provided. In
some embodiments, a training dataset of communication protocol messages having …

Methods, systems, and media for baiting inside attackers

SJ Stolfo, AD Keromytis, BM Bowen… - US Patent …, 2015 - Google Patents
2009-12-05 Assigned to THE TRUSTEES OF COLUMBIA UNIVERSITY IN THE CITY OF
NEW YORK reassignment THE TRUSTEES OF COLUMBIA UNIVERSITY IN THE CITY OF …

Methods, systems, and media for masquerade attack detection by monitoring computer user behavior

SJ Stolfo, MB Salem, S Hershkop - US Patent 8,769,684, 2014 - Google Patents
Methods, systems, and media for masquerade attack detec tion by monitoring computer user
behavior are provided. In accordance with some embodiments, a method for detecting …

Methods, media, and systems for detecting attack on a digital processing device

SJ Stolfo, WJ Li, AD Keromylis, E Androulaki - US Patent 8,789,172, 2014 - Google Patents
Methods, media, and systems for detecting attack are pro vided. In some embodiments, the
methods include: compar ing at least part of a document to a static detection model; …

McPAD: A multiple classifier system for accurate payload-based anomaly detection

R Perdisci, D Ariu, P Fogla, G Giacinto, W Lee - Computer networks, 2009 - Elsevier
Anomaly-based network intrusion detection systems (IDS) are valuable tools for the defense-
in-depth of computer networks. Unsupervised or unlabeled learning approaches for network …

Baiting inside attackers using decoy documents

BM Bowen, S Hershkop, AD Keromytis… - Security and Privacy in …, 2009 - Springer
The insider threat remains one of the most vexing problems in computer security. A number
of approaches have been proposed to detect nefarious insider actions including user …

Casting out demons: Sanitizing training data for anomaly sensors

GF Cretu, A Stavrou, ME Locasto… - … IEEE Symposium on …, 2008 - ieeexplore.ieee.org
The efficacy of anomaly detection (AD) sensors depends heavily on the quality of the data
used to train them. Artificial or contrived training data may not provide a realistic view of the …