[go: up one dir, main page]

Al‐Saleh et al., 2013 - Google Patents

Antivirus performance characterisation: system‐wide view

Al‐Saleh et al., 2013

View PDF @Full View
Document ID
14475800838180855450
Author
Al‐Saleh M
Espinoza A
Crandall J
Publication year
Publication venue
IET Information Security

External Links

Snippet

It is well accepted that basic protection against common cyber threats is important, so it is recommended to have antivirus (AV). However, what price do users pay in terms of performance and other usability factors? Although it is important for security researchers and …
Continue reading at ietresearch.onlinelibrary.wiley.com (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection
    • G06F21/563Static detection by source code analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/34Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation; Recording or statistical evaluation of user activity, e.g. usability assessment
    • G06F11/3409Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation; Recording or statistical evaluation of user activity, e.g. usability assessment for performance assessment
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/34Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation; Recording or statistical evaluation of user activity, e.g. usability assessment
    • G06F11/3466Performance evaluation by tracing or monitoring
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/36Preventing errors by testing or debugging software
    • G06F11/3668Software testing
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30861Retrieval from the Internet, e.g. browsers
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for programme control, e.g. control unit
    • G06F9/06Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
    • G06F9/46Multiprogramming arrangements
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/40Transformations of program code
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2201/00Indexing scheme relating to error detection, to error correction, and to monitoring
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N99/00Subject matter not provided for in other groups of this subclass

Similar Documents

Publication Publication Date Title
Zhu et al. Fuzzing: a survey for roadmap
Sánchez et al. A survey of challenges for runtime verification from advanced application domains (beyond software)
Zhang et al. Towards automatic generation of security-centric descriptions for android apps
US8850581B2 (en) Identification of malware detection signature candidate code
Al‐Saleh et al. Antivirus performance characterisation: system‐wide view
Safi et al. Detecting event anomalies in event-based systems
EP2827253B1 (en) Metaphor based language fuzzing of computer code
US20100192222A1 (en) Malware detection using multiple classifiers
Del Grosso et al. Detecting buffer overflow via automatic test input data generation
US20120054553A1 (en) Fault localization using condition modeling and return value modeling
Wu et al. Evaluating and improving neural program-smoothing-based fuzzing
Noor et al. Countering cyber threats for industrial applications: An automated approach for malware evasion detection and analysis
Vieira et al. Resilience benchmarking
Thummapudi et al. Detection of ransomware attacks using processor and disk usage data
Mouzarani et al. Smart fuzzing method for detecting stack‐based buffer overflow in binary codes
Wang et al. A systematic literature review on smart contract vulnerability detection by symbolic execution
Nazim et al. Systematic analysis of deep learning model for vulnerable code detection
Ma et al. Code analysis with static application security testing for python program
Zhang et al. CIDFuzz: Fuzz testing for continuous integration
Heelan et al. Augmenting vulnerability analysis of binary code
Wang et al. Offdtan: A new approach of offline dynamic taint analysis for binaries
Vasilakis et al. Efficient module-level dynamic analysis for dynamic languages with module recontextualization
Gupta et al. Text-mining and pattern-matching based prediction models for detecting vulnerable files in web applications
Zhang et al. SimFuzz: Test case similarity directed deep fuzzing
Adebiyi et al. Security assessment of software design using neural network