[go: up one dir, main page]

Li et al., 2008 - Google Patents

SPARSE: A Hybrid System to Detect Malcode-Bearing Documents

Li et al., 2008

View PDF
Document ID
559481996692170677
Author
Li W
Stolfo S
Publication year

External Links

Snippet

Embedding malcode within documents provides a convenient means of penetrating systems which may be unreachable by network-level service attacks. Such attacks can be very targeted and difficult to detect compared to the typical network worm threat due to the …
Continue reading at academiccommons.columbia.edu (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection
    • G06F21/563Static detection by source code analysis

Similar Documents

Publication Publication Date Title
Carmony et al. Extract Me If You Can: Abusing PDF Parsers in Malware Detectors.
Li et al. A study of malcode-bearing documents
Egele et al. A survey on automated dynamic malware-analysis techniques and tools
Tang et al. Unsupervised anomaly-based malware detection using hardware features
US7328453B2 (en) Systems and methods for the prevention of unauthorized use and manipulation of digital content
Veerappan et al. Taxonomy on malware evasion countermeasures techniques
AU2002305490A1 (en) Systems and methods for the prevention of unauthorized use and manipulation of digital content
Xu et al. {PlatPal}: Detecting Malicious Documents with Platform Diversity
Schlumberger et al. Jarhead analysis and detection of malicious java applets
Stolfo et al. Fileprint analysis for malware detection
AlSabeh et al. Exploiting ransomware paranoia for execution prevention
Sun et al. A praise for defensive programming: Leveraging uncertainty for effective malware mitigation
Yin et al. Automatic malware analysis: an emulator based approach
Sanok Jr An analysis of how antivirus methodologies are utilized in protecting computers from malicious code
Ninyesiga et al. Malware classification using API system calls
Belous et al. Computer viruses, malicious logic, and spyware
Zhang Polymorphic and metamorphic malware detection
Starink Analysis and automated detection of host-based code injection techniques in malware
Li et al. SPARSE: A Hybrid System to Detect Malcode-Bearing Documents
Sindoni Toward a methodology for malware analysis and characterization for Machine Learning application
Josse How to Assess the Effectiveness of your Anti-virus?
Singh A physiological decomposition of virus and worm programs
Barabosch Formalization and Detection of Host-Based Code Injection Attacks in the Context of Malware
Bauer et al. Multi-variant execution to protect unpatched software
Li et al. Thwarting attacks in malcode-bearing documents by altering data sector values