Title
Function Extraction Technology: Computing the Behavior of Malware
Abstract
Current methods of malware analysis are increasingly challenged by the scope and sophistication of attacks. Recent advances in software behavior computation illuminate an opportunity to compute the behavior of malware at machine speeds, to aid in understanding intruder methods and developing countermeasures. The behavior computation process helps eliminate certain forms of malware obfuscation and computes the net effects of the remaining functional code. This paper describes behavior computation technology and provides an example of its use in malware analysis.
Year
DOI
Venue
2011
10.1109/HICSS.2011.209
System Sciences
Keywords
Field
DocType
invasive software,attack,function extraction technology,functional code,intruder method,machine speed,malware,software behavior computation
Cryptovirology,Algorithm design,Computer security,Computer science,Software,Malware,Obfuscation,Malware analysis,Computation,Distributed computing,The Internet
Conference
ISSN
ISBN
Citations 
1530-1605
978-1-4244-9618-1
1
PageRank 
References 
Authors
0.37
5
4
Name
Order
Citations
PageRank
Richard C. Linger127445.75
Kirk Sayre2737.87
Daly, T.310.37
Mark G. Pleszkoch416421.67