Malicious programs have been the main actors in complex, sophisticated attacks against nations, governments, diplomatic agencies, private institutions and people. Knowledge about malicious program behavior forms the basis for constructing more secure information systems. In this article, we introduce MBO, a Malicious Behavior Ontology that represents complex behaviors of suspicious executions, and through inference rules calculates their associated threat level for analytical proposals. We evaluate MBO using over two thousand unique known malware and 385 unique known benign software. Results highlight the representativeness of the MBO for expressing typical malicious activities.111294
A daily task of malware analysts is the extraction of behaviors from malicious binaries. Such behavi...
Malicious software installed on infected computers is a fundamental component of online crime. Malwa...
We introduce a new representation for monitored behavior of malicious software called Malware Instru...
Malicious programs have been the main actors in complex, sophisticated attacks against nations, gove...
Exponential rise of Internet increases the risk of cyber attack related incidents which are generall...
The ubiquity of Internet-connected devices motivates attackers to create malicious programs (malware...
The term malware, in the area related to computer science, is used to define malicious code which is...
Antimalware applications represent one of the most important research topic in the area of informati...
Antimalware applications represent one of the most important research topic in the area of informati...
Abstract—The article describes the method of malware ac-tivities identification using ontology and r...
Malware detectors require a specification of malicious behav-ior. Typically, these specifications ar...
In this paper we describe the use of formal methods to model malware behaviour. The modelling of har...
In recent years, antimalware applications represented one of the most important research topics in t...
Malware investigation is a major issue in fighting cybercrime. Because most of the research in this ...
Malicious software, or malware for short, is software designed with a nefarious intent of harming th...
A daily task of malware analysts is the extraction of behaviors from malicious binaries. Such behavi...
Malicious software installed on infected computers is a fundamental component of online crime. Malwa...
We introduce a new representation for monitored behavior of malicious software called Malware Instru...
Malicious programs have been the main actors in complex, sophisticated attacks against nations, gove...
Exponential rise of Internet increases the risk of cyber attack related incidents which are generall...
The ubiquity of Internet-connected devices motivates attackers to create malicious programs (malware...
The term malware, in the area related to computer science, is used to define malicious code which is...
Antimalware applications represent one of the most important research topic in the area of informati...
Antimalware applications represent one of the most important research topic in the area of informati...
Abstract—The article describes the method of malware ac-tivities identification using ontology and r...
Malware detectors require a specification of malicious behav-ior. Typically, these specifications ar...
In this paper we describe the use of formal methods to model malware behaviour. The modelling of har...
In recent years, antimalware applications represented one of the most important research topics in t...
Malware investigation is a major issue in fighting cybercrime. Because most of the research in this ...
Malicious software, or malware for short, is software designed with a nefarious intent of harming th...
A daily task of malware analysts is the extraction of behaviors from malicious binaries. Such behavi...
Malicious software installed on infected computers is a fundamental component of online crime. Malwa...
We introduce a new representation for monitored behavior of malicious software called Malware Instru...