Li et al., 2008 - Google Patents
SPARSE: A Hybrid System to Detect Malcode-Bearing DocumentsLi et al., 2008
View PDF- Document ID
- 559481996692170677
- Author
- Li W
- Stolfo S
- Publication year
External Links
Snippet
Embedding malcode within documents provides a convenient means of penetrating systems which may be unreachable by network-level service attacks. Such attacks can be very targeted and difficult to detect compared to the typical network worm threat due to the …
- 238000001514 detection method 0 abstract description 60
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/562—Static detection
- G06F21/563—Static detection by source code analysis
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Carmony et al. | Extract Me If You Can: Abusing PDF Parsers in Malware Detectors. | |
Li et al. | A study of malcode-bearing documents | |
Egele et al. | A survey on automated dynamic malware-analysis techniques and tools | |
Tang et al. | Unsupervised anomaly-based malware detection using hardware features | |
US7328453B2 (en) | Systems and methods for the prevention of unauthorized use and manipulation of digital content | |
Veerappan et al. | Taxonomy on malware evasion countermeasures techniques | |
AU2002305490A1 (en) | Systems and methods for the prevention of unauthorized use and manipulation of digital content | |
Xu et al. | {PlatPal}: Detecting Malicious Documents with Platform Diversity | |
Schlumberger et al. | Jarhead analysis and detection of malicious java applets | |
Stolfo et al. | Fileprint analysis for malware detection | |
AlSabeh et al. | Exploiting ransomware paranoia for execution prevention | |
Sun et al. | A praise for defensive programming: Leveraging uncertainty for effective malware mitigation | |
Yin et al. | Automatic malware analysis: an emulator based approach | |
Sanok Jr | An analysis of how antivirus methodologies are utilized in protecting computers from malicious code | |
Ninyesiga et al. | Malware classification using API system calls | |
Belous et al. | Computer viruses, malicious logic, and spyware | |
Zhang | Polymorphic and metamorphic malware detection | |
Starink | Analysis and automated detection of host-based code injection techniques in malware | |
Li et al. | SPARSE: A Hybrid System to Detect Malcode-Bearing Documents | |
Sindoni | Toward a methodology for malware analysis and characterization for Machine Learning application | |
Josse | How to Assess the Effectiveness of your Anti-virus? | |
Singh | A physiological decomposition of virus and worm programs | |
Barabosch | Formalization and Detection of Host-Based Code Injection Attacks in the Context of Malware | |
Bauer et al. | Multi-variant execution to protect unpatched software | |
Li et al. | Thwarting attacks in malcode-bearing documents by altering data sector values |