[go: up one dir, main page]

Nazareno et al., 2021 - Google Patents

Dynamic Malware Analysis: Contrast between Physical and Virtual Environment

Nazareno et al., 2021

Document ID
7465661235442415807
Author
Nazareno B
Torres I
Jaramillo J
Publication year
Publication venue
Proceedings of the 52nd ACM Technical Symposium on Computer Science Education

External Links

Snippet

Dynamic malware analysis is essential to develop optimal intrusion detection systems. Performing this process from a virtual environment provides the advantage of containing the malware damage, so the real machine is not affected. However, it is suspected that the …
Continue reading at dl.acm.org (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection
    • G06F21/563Static detection by source code analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30067File systems; File servers
    • G06F17/30129Details of further file system functionalities
    • G06F17/30144Details of monitoring file system events, e.g. by the use of hooks, filter drivers, logs
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30861Retrieval from the Internet, e.g. browsers
    • G06F17/30864Retrieval from the Internet, e.g. browsers by querying, e.g. search engines or meta-search engines, crawling techniques, push systems
    • G06F17/30867Retrieval from the Internet, e.g. browsers by querying, e.g. search engines or meta-search engines, crawling techniques, push systems with filtering and personalisation
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30286Information retrieval; Database structures therefor; File system structures therefor in structured data stores
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Error detection; Error correction; Monitoring responding to the occurence of a fault, e.g. fault tolerance
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2101Auditing as a secondary aspect
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for programme control, e.g. control unit
    • G06F9/06Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/34Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation; Recording or statistical evaluation of user activity, e.g. usability assessment
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2201/00Indexing scheme relating to error detection, to error correction, and to monitoring

Similar Documents

Publication Publication Date Title
Schwab et al. SEER: A security experimentation environment for DETER
Mohanta et al. Preventing Ransomware: Understand, prevent, and remediate ransomware attacks
Vardi Cyber insecurity and cyber libertarianism
Nazareno et al. Dynamic Malware Analysis: Contrast between Physical and Virtual Environment
Chae et al. Effective and efficient detection of software theft via dynamic API authority vectors
Kuhn et al. What proportion of vulnerabilities can be attributed to ordinary coding errors? poster
Hossain Faruk Malware classification and detection using quantum neural network (qnn)
Situ et al. Detecting missing checks for identifying insufficient attack protections
Szefer Leveraging processor performance counters for security and performance
Wang et al. Analyzing Data Consistency in Smart Home Applications
Karabacak et al. Remote detection of unauthorized activity via spectral analysis: work-in-progress
Rieck Off the beaten path: Machine learning for offensive security
Diaz-Gonzalez et al. An exploratory deep learning approach to mobile malware detection
Forsberg et al. Demonstration of simulation software industrial path solutions (IPS)
Pethia Bugs in the programs
Inger et al. KDD-Cup 2000: question 1 winner's report
Cortez et al. Geo-Location Inference Attacks: From Modelling to Privacy Risk Assessment (Short Paper)
Rhee et al. LiveDM: kernel malware analysis with un-tampered and temporal views of dynamic kernel memory
Foschini Stateful intrusion detection in high-speed networks: A formalization and analysis of high-speed stateful signature matching for intrusion detection
Ho et al. Build better APIs with the next generation of API testing and monitoring
Webb Finding the real patterns
Ries Automated identification of malicious code variants
Haas CompTIA CSA+. Exam Guide (Exam CS0-001) Cybersecurity Analyst Certification
Li Algorithms for mining uncertain graph data
Thelwall Handbook of research on web log analysis