A survey on automated dynamic malware-analysis techniques and tools

M Egele, T Scholte, E Kirda, C Kruegel - ACM computing surveys (CSUR …, 2008 - dl.acm.org
Anti-virus vendors are confronted with a multitude of potentially malicious samples today.
Receiving thousands of new samples every day is not uncommon. The signatures that …

Panorama: capturing system-wide information flow for malware detection and analysis

H Yin, D Song, M Egele, C Kruegel… - Proceedings of the 14th …, 2007 - dl.acm.org
Malicious programs spy on users' behavior and compromise their privacy. Even software
from reputable vendors, such as Google Desktop and Sony DRM media player, may perform …

Cyber kill chain-based taxonomy of advanced persistent threat actors: Analogy of tactics, techniques, and procedures

PN Bahrami, A Dehghantanha, T Dargahi… - Journal of information …, 2019 - koreascience.kr
The need for cyber resilience is increasingly important in our technology-dependent society
where computing devices and data have been, and will continue to be, the target of cyber …

Behavior-based Spyware Detection.

E Kirda, C Kruegel, G Banks, G Vigna… - Usenix Security …, 2006 - usenix.org
Spyware is rapidly becoming a major security issue. Spyware programs are surreptitiously
installed on a user's workstation to monitor his/her actions and gather private information …

[PDF][PDF] A crawler-based study of spyware in the web.

A Moshchuk, T Bragin, SD Gribble, HM Levy - NDSS, 2006 - courses.cs.washington.edu
Malicious spyware poses a significant threat to desktop security and integrity. This paper
examines that threat from an Internet perspective. Using a crawler, we performed a large …

[PDF][PDF] Dynamic spyware analysis

M Egele, C Kruegel, E Kirda, H Yin, D Song - 2007 - usenix.org
Spyware is a class of malicious code that is surreptitiously installed on victims' machines.
Once active, it silently monitors the behavior of users, records their web surfing habits, and …

Detecting stealth software with strider ghostbuster

YM Wang, D Beck, B Vo, R Roussev… - … and Networks (DSN' …, 2005 - ieeexplore.ieee.org
Stealth malware programs that silently infect enterprise and consumer machines are
becoming a major threat to the future of the Internet. Resource hiding is a powerful stealth …

[PDF][PDF] SpyProxy: Execution-based Detection of Malicious Web Content.

A Moshchuk, T Bragin, D Deville, SD Gribble… - USENIX security …, 2007 - usenix.org
This paper explores the use of execution-based Web content analysis to protect users from
Internet-borne malware. Many anti-malware tools use signatures to identify malware …

Automatic inference and enforcement of kernel data structure invariants

A Baliga, V Ganapathy, L Iftode - 2008 Annual Computer …, 2008 - ieeexplore.ieee.org
Kernel-level rootkits affect system security by modifying key kernel data structures to achieve
a variety of malicious goals. While early rootkits modified control data structures, such as the …

Feedback-driven malware detector

SM Reasor, AJ Newman, RA Franczyk, J Garms… - US Patent …, 2010 - Google Patents
Embodiments of a feedback-driven malware detector are directed to protecting a computer
from programs that perform actions that are malicious or not expected by a user. In one …