Catálogo de publicaciones - libros
Malware Detection
Mihai Christodorescu ; Somesh Jha ; Douglas Maughan ; Dawn Song ; Cliff Wang (eds.)
Resumen/Descripción – provisto por la editorial
No disponible.
Palabras clave – provistas por la editorial
No disponibles.
Disponibilidad
| Institución detectada | Año de publicación | Navegá | Descargá | Solicitá |
|---|---|---|---|---|
| No detectada | 2007 | SpringerLink |
Información
Tipo de recurso:
libros
ISBN impreso
978-0-387-32720-4
ISBN electrónico
978-0-387-44599-1
Editor responsable
Springer Nature
País de edición
Reino Unido
Fecha de publicación
2007
Información sobre derechos de publicación
© Springer Science+Business Media, LLC. 2007
Cobertura temática
Tabla de contenidos
Towards Stealthy Malware Detection
Salvatore J. Stolfo; Ke Wang; Wei-Jen Li
Malcode can be easily hidden in document files and go undetected by standard technology. We demonstrate this opportunity of stealthy malcode insertion in several experiments using a standard COTS Anti-Virus (AV) scanner. Furthermore, in the case of malicious exploit code, signature- based AV scanners would fail to detect such malcode even if the scanner knew where to look. We propose the use of statistical binary content analysis of files in order to detect suspicious anomalous file segments that may suggest insertion of malcode. Experiments are performed to determine whether the approach of n-gram analysis may provide useful evidence of a tainted file that would subsequently be subjected to further scmtiny. We further perform tests to determine whether known malcode can be easily distinguished from otherwise “normal” Windows executables, and whether self-encrypted files may be easy to spot. Our goal is to develop an efficient means by static content analysis of detecting suspect infected files. This approach may have value for scanning a large store of collected information, such as a database of shared documents. The preliminary experiments suggest the problem is quite hard requiring new research to detect stealthy malcode.
Part IV - Stealthy and Targeted Threat Detection and Defense | Pp. 231-249
Pioneer: Verifying Code Integrity and Enforcing Untampered Code Execution on Legacy Systems
Arvind Seshadri; Mark Luk; Adrian Perrig; Leendert van Doom; Pradeep Khosla
We propose a primitive, called Pioneer, as a first step towards verifiable code execution on untrusted legacy hosts. Pioneer does not require any hardware support such as secure co-processors or CPU-architecture extensions. We implement Pioneer on an Intel Pentiurn IV Xeon processor. Pioneer can be used as a basic building block to build security systems. We demonstrate this by building a kernel rootkit detector.
Part V - Novel Techniques for Constructing Trustworthy Services | Pp. 253-289
Principles of Secure Information Flow Analysis
Geoffrey Smith
In today’s world of the Internet, the World-Wide Web, and Google, information is more accessible than ever before. An unfortunate corollary is that it is harder than ever to protect the privacy of sensitive information. In this chapter, we explore a technique called .
Part V - Novel Techniques for Constructing Trustworthy Services | Pp. 291-307