Sciweavers

2 search results - page 1 / 1
» SpyCon: Emulating User Activities to Detect Evasive Spyware
Sort
View
IPCCC
2007
IEEE
13 years 10 months ago
SpyCon: Emulating User Activities to Detect Evasive Spyware
The success of any spyware is determined by its ability to evade detection. Although traditional detection methodologies employing signature and anomaly based systems have had rea...
Madhusudhanan Chandrasekaran, Vidyaraman Vidyarama...
SP
2006
IEEE
127views Security Privacy» more  SP 2006»
13 years 10 months ago
Siren: Catching Evasive Malware (Short Paper)
With the growing popularity of anomaly detection systems, which is due partly to the rise in zero-day attacks, a new class of threats have evolved where the attacker mimics legiti...
Kevin Borders, Xin Zhao, Atul Prakash