An open research question in malware detection is how to accurately and reliably distinguish a malware program from a benign one, running on the same machine. In contrast to code signatures, which are commonly used in commercial protection software, signatures derived from system calls have the potential to form the basis of a much more flexible defense mechanism. However, the performance degradation caused by monitoring systems calls could adversely impact the machine. In this paper we report our experimental experience in implementing API hooking to capture sequences of API calls. The loading time often common programs was benchmarked with three different settings: plain, computer with antivirus and computer with API hook. Results suggest...
In the era of ubiquitous sensors and smart devices, detecting malware is becoming an endless battle ...
Models based on system calls are a popular and common approach to characterize the run-time behavior...
Malware is a major security threat confronting computer systems and networks and has increased in sc...
An open research question in malware detection is how to accurately and reliably distinguish a malwa...
API call hooking is a technique that malware researchers use to mine malware's API calls. These API ...
One of the recent trends adopted by malware authors is to use packers or software tools that instiga...
This paper proposes a scalable approach for distinguishing malicious files from clean files by inves...
Malware is a serious threat being posed and it has been a continuous process of protecting the syste...
Malware is software code that has malicious intent. In recent years, there have beenhuge changes in ...
In this paper, we propose a five-step approach to detect obfuscated malware by investigating the str...
Malware attacks have become a global threat to which no person or organization seems immune. Drive-b...
Today, the amount of malware is growing very rapidly, and the types and behaviors of malware are bec...
In this paper, we propose a five-step approach to detect obfuscated malware by investigating the str...
The proper interpretation of the malware API call sequence plays a crucial role in identifying its m...
The widespread development of the malware industry is considered the main threat to our e-society. T...
In the era of ubiquitous sensors and smart devices, detecting malware is becoming an endless battle ...
Models based on system calls are a popular and common approach to characterize the run-time behavior...
Malware is a major security threat confronting computer systems and networks and has increased in sc...
An open research question in malware detection is how to accurately and reliably distinguish a malwa...
API call hooking is a technique that malware researchers use to mine malware's API calls. These API ...
One of the recent trends adopted by malware authors is to use packers or software tools that instiga...
This paper proposes a scalable approach for distinguishing malicious files from clean files by inves...
Malware is a serious threat being posed and it has been a continuous process of protecting the syste...
Malware is software code that has malicious intent. In recent years, there have beenhuge changes in ...
In this paper, we propose a five-step approach to detect obfuscated malware by investigating the str...
Malware attacks have become a global threat to which no person or organization seems immune. Drive-b...
Today, the amount of malware is growing very rapidly, and the types and behaviors of malware are bec...
In this paper, we propose a five-step approach to detect obfuscated malware by investigating the str...
The proper interpretation of the malware API call sequence plays a crucial role in identifying its m...
The widespread development of the malware industry is considered the main threat to our e-society. T...
In the era of ubiquitous sensors and smart devices, detecting malware is becoming an endless battle ...
Models based on system calls are a popular and common approach to characterize the run-time behavior...
Malware is a major security threat confronting computer systems and networks and has increased in sc...