Sciweavers

109 search results - page 10 / 22
» Using IRP for Malware Detection
Sort
View
ICC
2008
IEEE
15 years 4 months ago
Detecting Malware Outbreaks Using a Statistical Model of Blackhole Traffic
Sohraab Soltani, Syed A. Khayam, Hayder Radha
92
Voted
ASPLOS
2006
ACM
15 years 3 months ago
Temporal search: detecting hidden malware timebombs with virtual machines
Worms, viruses, and other malware can be ticking bombs counting down to a specific time, when they might, for example, delete files or download new instructions from a public we...
Jedidiah R. Crandall, Gary Wassermann, Daniela A. ...
RAID
2010
Springer
14 years 7 months ago
BotSwindler: Tamper Resistant Injection of Believable Decoys in VM-Based Hosts for Crimeware Detection
We introduce BotSwindler, a bait injection system designed to delude and detect crimeware by forcing it to reveal during the exploitation of monitored information. The implementati...
Brian M. Bowen, Pratap V. Prabhu, Vasileios P. Kem...