Abstract | ||
---|---|---|
Current methods of malware analysis are increasingly challenged by the scope and sophistication of attacks. Recent advances in software behavior computation illuminate an opportunity to compute the behavior of malware at machine speeds, to aid in understanding intruder methods and developing countermeasures. The behavior computation process helps eliminate certain forms of malware obfuscation and computes the net effects of the remaining functional code. This paper describes behavior computation technology and provides an example of its use in malware analysis. |
Year | DOI | Venue |
---|---|---|
2011 | 10.1109/HICSS.2011.209 | System Sciences |
Keywords | Field | DocType |
invasive software,attack,function extraction technology,functional code,intruder method,machine speed,malware,software behavior computation | Cryptovirology,Algorithm design,Computer security,Computer science,Software,Malware,Obfuscation,Malware analysis,Computation,Distributed computing,The Internet | Conference |
ISSN | ISBN | Citations |
1530-1605 | 978-1-4244-9618-1 | 1 |
PageRank | References | Authors |
0.37 | 5 | 4 |
Name | Order | Citations | PageRank |
---|---|---|---|
Richard C. Linger | 1 | 274 | 45.75 |
Kirk Sayre | 2 | 73 | 7.87 |
Daly, T. | 3 | 1 | 0.37 |
Mark G. Pleszkoch | 4 | 164 | 21.67 |