Nazareno et al., 2021 - Google Patents
Dynamic Malware Analysis: Contrast between Physical and Virtual EnvironmentNazareno et al., 2021
- Document ID
- 7465661235442415807
- Author
- Nazareno B
- Torres I
- Jaramillo J
- Publication year
- Publication venue
- Proceedings of the 52nd ACM Technical Symposium on Computer Science Education
External Links
Snippet
Dynamic malware analysis is essential to develop optimal intrusion detection systems. Performing this process from a virtual environment provides the advantage of containing the malware damage, so the real machine is not affected. However, it is suspected that the …
- 238000000034 method 0 abstract description 4
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/562—Static detection
- G06F21/563—Static detection by source code analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30067—File systems; File servers
- G06F17/30129—Details of further file system functionalities
- G06F17/30144—Details of monitoring file system events, e.g. by the use of hooks, filter drivers, logs
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30861—Retrieval from the Internet, e.g. browsers
- G06F17/30864—Retrieval from the Internet, e.g. browsers by querying, e.g. search engines or meta-search engines, crawling techniques, push systems
- G06F17/30867—Retrieval from the Internet, e.g. browsers by querying, e.g. search engines or meta-search engines, crawling techniques, push systems with filtering and personalisation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30286—Information retrieval; Database structures therefor; File system structures therefor in structured data stores
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/07—Error detection; Error correction; Monitoring responding to the occurence of a fault, e.g. fault tolerance
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2101—Auditing as a secondary aspect
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for programme control, e.g. control unit
- G06F9/06—Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/30—Monitoring
- G06F11/34—Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation; Recording or statistical evaluation of user activity, e.g. usability assessment
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2201/00—Indexing scheme relating to error detection, to error correction, and to monitoring
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Schwab et al. | SEER: A security experimentation environment for DETER | |
Mohanta et al. | Preventing Ransomware: Understand, prevent, and remediate ransomware attacks | |
Vardi | Cyber insecurity and cyber libertarianism | |
Nazareno et al. | Dynamic Malware Analysis: Contrast between Physical and Virtual Environment | |
Chae et al. | Effective and efficient detection of software theft via dynamic API authority vectors | |
Kuhn et al. | What proportion of vulnerabilities can be attributed to ordinary coding errors? poster | |
Hossain Faruk | Malware classification and detection using quantum neural network (qnn) | |
Situ et al. | Detecting missing checks for identifying insufficient attack protections | |
Szefer | Leveraging processor performance counters for security and performance | |
Wang et al. | Analyzing Data Consistency in Smart Home Applications | |
Karabacak et al. | Remote detection of unauthorized activity via spectral analysis: work-in-progress | |
Rieck | Off the beaten path: Machine learning for offensive security | |
Diaz-Gonzalez et al. | An exploratory deep learning approach to mobile malware detection | |
Forsberg et al. | Demonstration of simulation software industrial path solutions (IPS) | |
Pethia | Bugs in the programs | |
Inger et al. | KDD-Cup 2000: question 1 winner's report | |
Cortez et al. | Geo-Location Inference Attacks: From Modelling to Privacy Risk Assessment (Short Paper) | |
Rhee et al. | LiveDM: kernel malware analysis with un-tampered and temporal views of dynamic kernel memory | |
Foschini | Stateful intrusion detection in high-speed networks: A formalization and analysis of high-speed stateful signature matching for intrusion detection | |
Ho et al. | Build better APIs with the next generation of API testing and monitoring | |
Webb | Finding the real patterns | |
Ries | Automated identification of malicious code variants | |
Haas | CompTIA CSA+. Exam Guide (Exam CS0-001) Cybersecurity Analyst Certification | |
Li | Algorithms for mining uncertain graph data | |
Thelwall | Handbook of research on web log analysis |