Sciweavers

23 search results - page 1 / 5
» A Toolkit for Detecting and Analyzing Malicious Software
Sort
View
87
Voted
ACSAC
2002
IEEE
15 years 3 months ago
A Toolkit for Detecting and Analyzing Malicious Software
In this paper we present PEAT: The Portable Executable Analysis Toolkit. It is a software prototype designed to provide a selection of tools that an analyst may use in order to ex...
Michael Weber, Matthew Schmid, Michael Schatz, Dav...
88
Voted
ICONIP
2009
14 years 8 months ago
Automated Log Analysis of Infected Windows OS Using Mechanized Reasoning
Malware (Malicious Software) of Windows OS has become more sophisticated. To take some countermeasures for recent infection, more intelligent and automated system log analysis is n...
Ruo Ando
82
Voted
ACSAC
2000
IEEE
15 years 2 months ago
Security Agility in Response to Intrusion Detection
Cooperative frameworks for intrusion detection and response exemplify a key area of today’s computer research: automating defenses against malicious attacks that increasingly ar...
M. Petkac, Lee Badger
MOBISYS
2011
ACM
14 years 1 months ago
Analyzing inter-application communication in Android
Modern smartphone operating systems support the development of third-party applications with open system APIs. In addition to an open API, the Android operating system also provid...
Erika Chin, Adrienne Porter Felt, Kate Greenwood, ...
70
Voted
AAAI
2008
15 years 16 days ago
Learning to Analyze Binary Computer Code
We present a novel application of structured classification: identifying function entry points (FEPs, the starting byte of each function) in program binaries. Such identification ...
Nathan E. Rosenblum, Xiaojin Zhu, Barton P. Miller...