Attacking malicious code: A report to the infosec research council

G McGraw, G Morrisett - IEEE software, 2000 - ieeexplore.ieee.org
The accelerating trends of interconnectedness, complexity, and extensibility are aggravating
the already-serious threat posed by malicious code. To combat malicious code, these …

[图书][B] Malware: Fighting malicious code

E Skoudis, L Zeltser - 2004 - books.google.com
Malicious code is a set of instructions that runs on your computer and makes your system do
something that you do not want it to do. For example, it can delete sensitive configuration …

The real cost of software errors

M Zhivich, RK Cunningham - IEEE Security & Privacy, 2009 - ieeexplore.ieee.org
The Real Cost of Software Errors Page 1 Secure Systems Editor: Sean W. Smith, sws@cs.dartmouth.edu
MARCH/APRIL 2009 ■ 1540-7993/09/$25.00 © 2009 IEEE ■ COPubLIsHEd by tHE IEEE …

Lines of malicious code: Insights into the malicious software industry

M Lindorfer, A Di Federico, F Maggi… - Proceedings of the 28th …, 2012 - dl.acm.org
Malicious software installed on infected computers is a fundamental component of online
crime. Malware development thus plays an essential role in the underground economy of …

From the ground up: The DIMACS software security workshop

G McGraw - IEEE Security & Privacy, 2003 - ieeexplore.ieee.org
The DIMACS Software Security Workshop held in New Jersey explored issues such as
security engineering, architecture and implementation risks, security analysis, mobile and …

Static analysis of executables to detect malicious patterns

M Christodorescu, S Jha - 12th USENIX Security Symposium (USENIX …, 2003 - usenix.org
Malicious code detection is a crucial component of any defense mechanism. In this paper,
we present a unique viewpoint on malicious code detection. We regard malicious code …

Software engineering for security: a roadmap

PT Devanbu, S Stubblebine - Proceedings of the Conference on the …, 2000 - dl.acm.org
Is there such a thing anymore as a software system that doesn't need to be secure? Almost
every softwarecontrolled system faces threats from potential adversaries, from Internet …

[PDF][PDF] Operating system protection through program evolution.

FB Cohen - Comput. Secur., 1993 - all.net
From the beginning of electronic computing until 15 years ago, the 'game'of attack and
defense was played on a system by system basis, with defenders relying on physical …

[图书][B] Computer viruses and malware

J Aycock - 2006 - books.google.com
Our Internet-connected society increasingly relies on computers. As a result, attacks on
computers from malicious software have never been a bigger concern. Computer Viruses …

Seven pernicious kingdoms: A taxonomy of software security errors

K Tsipenyuk, B Chess, G McGraw - IEEE Security & Privacy, 2005 - ieeexplore.ieee.org
Taxonomies can help software developers and security practitioners understand the
common coding mistakes that affect security. The goal is to help developers avoid making …