Obfuscation and cryptography technologies are applied to malware to make the detection of malware through intrusion prevention systems (IPSs), intrusion detection systems (IDSs), and antiviruses difficult. To address this problem, the security requirements for post-detection and proper response are presented, with emphasis on the real-time file access monitoring function. However, current operating systems provide only file access control techniques, such as SELinux (version 2.6, Red Hat, Raleigh, NC, USA) and AppArmor (version 2.5, Immunix, Portland, OR, USA), to protect system files and do not provide real-time file access monitoring. Thus, the service manager or data owner cannot determine real-time unauthorized modification and leakage ...
A malware is a program that has a malicious intent. Nowadays, attack from malwares is rising in alar...
There are several ways for an intruder to obtain access to a remote computing system, such as explo...
Abstract—Targeting the operating system kernel, the core of trust in a system, kernel rootkits are a...
Abstract—Monitoring a process and its file I/O behaviors is important for security inspection for a ...
An operating system kernel is the core of system software which is responsible for the integrity and...
Abstract — This paper describes a variation of a kernel-level Intrusion Detection System (IDS). In p...
Kernel-level malware is one of the most dangerous threats to the security of users on the Internet, ...
We describe an anomaly detector, called FWRAP, for a Host-based Intrusion Detection System that moni...
AbstractThe file system becomes the usual target of malicious attacks because it contains lots of se...
In this paper obfuscation techniques used by novel malwares presented and compared. IAT smashing, st...
The integrity of operating system (OS) kernels is of paramount importance in order to ensure the sec...
Spyware refers to programs that steal the user information stored in the user's computer and transmi...
The operating system kernel serves as the root of trust for all applications running on the computer...
Integrity of operating system components must be carefully handled in order to optimize the system s...
Various vulnerabilities in software applications become easy targets for attackers. The trend consta...
A malware is a program that has a malicious intent. Nowadays, attack from malwares is rising in alar...
There are several ways for an intruder to obtain access to a remote computing system, such as explo...
Abstract—Targeting the operating system kernel, the core of trust in a system, kernel rootkits are a...
Abstract—Monitoring a process and its file I/O behaviors is important for security inspection for a ...
An operating system kernel is the core of system software which is responsible for the integrity and...
Abstract — This paper describes a variation of a kernel-level Intrusion Detection System (IDS). In p...
Kernel-level malware is one of the most dangerous threats to the security of users on the Internet, ...
We describe an anomaly detector, called FWRAP, for a Host-based Intrusion Detection System that moni...
AbstractThe file system becomes the usual target of malicious attacks because it contains lots of se...
In this paper obfuscation techniques used by novel malwares presented and compared. IAT smashing, st...
The integrity of operating system (OS) kernels is of paramount importance in order to ensure the sec...
Spyware refers to programs that steal the user information stored in the user's computer and transmi...
The operating system kernel serves as the root of trust for all applications running on the computer...
Integrity of operating system components must be carefully handled in order to optimize the system s...
Various vulnerabilities in software applications become easy targets for attackers. The trend consta...
A malware is a program that has a malicious intent. Nowadays, attack from malwares is rising in alar...
There are several ways for an intruder to obtain access to a remote computing system, such as explo...
Abstract—Targeting the operating system kernel, the core of trust in a system, kernel rootkits are a...