[[abstract]]Worms and Exploits attacks are currently the most prevalent security problems; they are responsible for over half of the CERT advisories issued in the last three years. To initiate an infection or intrusion, both of them inject a small piece of malicious code (ShellCode) into software through buffer or heap overflow vulnerabilities. Unlike Unix-like operating systems, ShellCodes for Microsoft Windows system need more complex steps to acquire Win32 API calls from DLL file (Dynamic Load Library) in Microsoft Windows. In this paper, we proposed an effective API monitoring system to get rid of worms and exploits attacks for the Microsoft Windows without hardware support. We address the problem by noticing that ShellCodes need the ex...
Botnets, which consist of thousands of compromised machines, can cause significant threats to other ...
Trojan horse is said to be one of the most serious threats to computer security. A Trojan horse is a...
Nowadays, the usages of the internet have grown rapidly. But internet also is exposed to any kind th...
This paper explains why ransomware needs to use the Windows API to encrypt files andhow this can be ...
Computers have become an inherent part of our daily lives today. The Windows operating system achiev...
International audienceBinary packing, encoding binary code prior to execution and decoding them at r...
AbstractThis paper proposes a novel method of preventing shellcode execution even if DEP is bypassed...
Over the past two decades, packed malware is always a veritable challenge to security analysts. Not ...
API call hooking is a technique that malware researchers use to mine malware's API calls. These API ...
The ability of worms to spread at rates that effectively preclude human-directed reaction has elevat...
Document-based code injection attacks, where-in malicious code (coined shellcode) is embedded in a d...
The goal of the research presented in this dissertation is to prevent, detect, and mitigate maliciou...
Abstract. Drive-by download attacks are among the most common methods for spreading malware today. T...
An open research question in malware detection is how to accurately and reliably distinguish a malwa...
This report starts out discussing a framework for building an API monitoring system. In such a syst...
Botnets, which consist of thousands of compromised machines, can cause significant threats to other ...
Trojan horse is said to be one of the most serious threats to computer security. A Trojan horse is a...
Nowadays, the usages of the internet have grown rapidly. But internet also is exposed to any kind th...
This paper explains why ransomware needs to use the Windows API to encrypt files andhow this can be ...
Computers have become an inherent part of our daily lives today. The Windows operating system achiev...
International audienceBinary packing, encoding binary code prior to execution and decoding them at r...
AbstractThis paper proposes a novel method of preventing shellcode execution even if DEP is bypassed...
Over the past two decades, packed malware is always a veritable challenge to security analysts. Not ...
API call hooking is a technique that malware researchers use to mine malware's API calls. These API ...
The ability of worms to spread at rates that effectively preclude human-directed reaction has elevat...
Document-based code injection attacks, where-in malicious code (coined shellcode) is embedded in a d...
The goal of the research presented in this dissertation is to prevent, detect, and mitigate maliciou...
Abstract. Drive-by download attacks are among the most common methods for spreading malware today. T...
An open research question in malware detection is how to accurately and reliably distinguish a malwa...
This report starts out discussing a framework for building an API monitoring system. In such a syst...
Botnets, which consist of thousands of compromised machines, can cause significant threats to other ...
Trojan horse is said to be one of the most serious threats to computer security. A Trojan horse is a...
Nowadays, the usages of the internet have grown rapidly. But internet also is exposed to any kind th...