Al‐Saleh et al., 2013 - Google Patents
Antivirus performance characterisation: system‐wide viewAl‐Saleh et al., 2013
View PDF- Document ID
- 14475800838180855450
- Author
- Al‐Saleh M
- Espinoza A
- Crandall J
- Publication year
- Publication venue
- IET Information Security
External Links
Snippet
It is well accepted that basic protection against common cyber threats is important, so it is recommended to have antivirus (AV). However, what price do users pay in terms of performance and other usability factors? Although it is important for security researchers and …
- 230000002155 anti-virotic 0 title abstract description 100
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/562—Static detection
- G06F21/563—Static detection by source code analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/30—Monitoring
- G06F11/34—Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation; Recording or statistical evaluation of user activity, e.g. usability assessment
- G06F11/3409—Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation; Recording or statistical evaluation of user activity, e.g. usability assessment for performance assessment
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/30—Monitoring
- G06F11/34—Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation; Recording or statistical evaluation of user activity, e.g. usability assessment
- G06F11/3466—Performance evaluation by tracing or monitoring
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/36—Preventing errors by testing or debugging software
- G06F11/3668—Software testing
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30861—Retrieval from the Internet, e.g. browsers
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for programme control, e.g. control unit
- G06F9/06—Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
- G06F9/46—Multiprogramming arrangements
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F8/00—Arrangements for software engineering
- G06F8/40—Transformations of program code
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2201/00—Indexing scheme relating to error detection, to error correction, and to monitoring
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N99/00—Subject matter not provided for in other groups of this subclass
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Zhu et al. | Fuzzing: a survey for roadmap | |
Sánchez et al. | A survey of challenges for runtime verification from advanced application domains (beyond software) | |
Zhang et al. | Towards automatic generation of security-centric descriptions for android apps | |
US8850581B2 (en) | Identification of malware detection signature candidate code | |
Al‐Saleh et al. | Antivirus performance characterisation: system‐wide view | |
Safi et al. | Detecting event anomalies in event-based systems | |
EP2827253B1 (en) | Metaphor based language fuzzing of computer code | |
US20100192222A1 (en) | Malware detection using multiple classifiers | |
Del Grosso et al. | Detecting buffer overflow via automatic test input data generation | |
US20120054553A1 (en) | Fault localization using condition modeling and return value modeling | |
Wu et al. | Evaluating and improving neural program-smoothing-based fuzzing | |
Noor et al. | Countering cyber threats for industrial applications: An automated approach for malware evasion detection and analysis | |
Vieira et al. | Resilience benchmarking | |
Thummapudi et al. | Detection of ransomware attacks using processor and disk usage data | |
Mouzarani et al. | Smart fuzzing method for detecting stack‐based buffer overflow in binary codes | |
Wang et al. | A systematic literature review on smart contract vulnerability detection by symbolic execution | |
Nazim et al. | Systematic analysis of deep learning model for vulnerable code detection | |
Ma et al. | Code analysis with static application security testing for python program | |
Zhang et al. | CIDFuzz: Fuzz testing for continuous integration | |
Heelan et al. | Augmenting vulnerability analysis of binary code | |
Wang et al. | Offdtan: A new approach of offline dynamic taint analysis for binaries | |
Vasilakis et al. | Efficient module-level dynamic analysis for dynamic languages with module recontextualization | |
Gupta et al. | Text-mining and pattern-matching based prediction models for detecting vulnerable files in web applications | |
Zhang et al. | SimFuzz: Test case similarity directed deep fuzzing | |
Adebiyi et al. | Security assessment of software design using neural network |