WebSite Logo
  • Content
  • Similar Resources
  • Metadata
  • Cite This
  • Log-in
  • Fullscreen
Log-in
Do not have an account? Register Now
Forgot your password? Account recovery
  1. International Conference on Malicious and Unwanted Software (MALWARE).
  2. 2011 6th International Conference on Malicious and Unwanted Software
  3. Multiprocess malware
Loading...

Please wait, while we are loading the content...

2015 10th International Conference on Malicious and Unwanted Software (MALWARE)
2014 9th International Conference on Malicious and Unwanted Software: The Americas (MALWARE)
2013 8th International Conference on Malicious and Unwanted Software: "The Americas" (MALWARE)
2012 7th International Conference on Malicious and Unwanted Software
2011 6th International Conference on Malicious and Unwanted Software
Game-theoretic design of an information exchange model for detecting packed malware
Multiprocess malware
Exploring network-based malware classification
Testing protections against web threats
Evaluating security products based on appropriate usage
Distributed malware analysis scheduling
Results-oriented security
Building malware infection trees
ROP payload detection using speculative code execution
Using static analysis for automatic assessment and mitigation of unwanted and malicious activities within Android applications
DroidDreamLight lurks behind legitimate Android apps
Android platform based linux kernel rootkit
Secure service distribution for VErsatile Service-Oriented Wireless Mesh Networks
Phishing by form: The abuse of form sites
Evidence of Advanced Persistent Threat: A case study of malware for political espionage
A recoverable hybrid C&C botnet
2010 5th International Conference on Malicious and Unwanted Software
2009 4th International Conference on Malicious and Unwanted Software (MALWARE)
2008 3rd International Conference on Malicious and Unwanted Software (MALWARE)

Similar Documents

...
Malware Behavior Analysis: Learning and Understanding Current Malware Threats

Article

...
Malware detection using linear SVM

Article

...
A behavior based malware detection scheme for avoiding false positive

Article

...
Ontology for Malware Behavior: A Core Model Proposal

Article

...
Feature-based Page Trojan study

Article

...
Proactive malware collection and classification system: How to collect and classify useful malware samples?

Article

...
Dynamic Innate Immune System Model for Malware Detection

Article

...
Multi-stage delivery of malware

Article

...
Performance of malware detection tools: A comparison

Article

Multiprocess malware

Content Provider IEEE Xplore Digital Library
Author Ramilli, M. Bishop, M. Shining Sun
Copyright Year 2011
Description Author affiliation: Department of Computer Science, Univ. of California, Davis, Davis, CA 95616-8562, USA (Bishop, M.) || Computer Science, Univ. of Hong Kong, Hong Kong (Shining Sun) || DEIS, Univ. of Bologna Via Venezia, 52 - 47023, Cesena, Italy (Ramilli, M.)
Abstract Malware behavior detectors observe the behavior of suspected malware by emulating its execution or executing it in a sandbox or other restrictive, instrumented environment. This assumes that the process, or process family, being monitored will exhibit the targeted behavior if it contains malware. We describe a technique for evading such detection by distributing the malware over multiple processes. We then present a method for countering this technique, and present results of tests that validate our claims.
Starting Page 8
Ending Page 13
File Size 394547
Page Count 6
File Format PDF
ISBN 9781467300315
e-ISBN 9781467300346
DOI 10.1109/MALWARE.2011.6112320
Language English
Publisher Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Publisher Date 2011-10-18
Publisher Place USA
Access Restriction Subscribed
Rights Holder Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Subject Keyword Detectors Software HTML Internet Trojan horses Grippers
Content Type Text
Resource Type Article
  • About
  • Disclaimer
  • Feedback
  • Sponsor
  • Contact
  • Chat with Us
About National Digital Library of India (NDLI)
NDLI logo

National Digital Library of India (NDLI) is a virtual repository of learning resources which is not just a repository with search/browse facilities but provides a host of services for the learner community. It is sponsored and mentored by Ministry of Education, Government of India, through its National Mission on Education through Information and Communication Technology (NMEICT). Filtered and federated searching is employed to facilitate focused searching so that learners can find the right resource with least effort and in minimum time. NDLI provides user group-specific services such as Examination Preparatory for School and College students and job aspirants. Services for Researchers and general learners are also provided. NDLI is designed to hold content of any language and provides interface support for 10 most widely used Indian languages. It is built to provide support for all academic levels including researchers and life-long learners, all disciplines, all popular forms of access devices and differently-abled learners. It is designed to enable people to learn and prepare from best practices from all over the world and to facilitate researchers to perform inter-linked exploration from multiple sources. It is developed, operated and maintained from Indian Institute of Technology Kharagpur.

Learn more about this project from here.

Disclaimer

NDLI is a conglomeration of freely available or institutionally contributed or donated or publisher managed contents. Almost all these contents are hosted and accessed from respective sources. The responsibility for authenticity, relevance, completeness, accuracy, reliability and suitability of these contents rests with the respective organization and NDLI has no responsibility or liability for these. Every effort is made to keep the NDLI portal up and running smoothly unless there are some unavoidable technical issues.

Feedback

Sponsor

Ministry of Education, through its National Mission on Education through Information and Communication Technology (NMEICT), has sponsored and funded the National Digital Library of India (NDLI) project.

Contact National Digital Library of India
Central Library (ISO-9001:2015 Certified)
Indian Institute of Technology Kharagpur
Kharagpur, West Bengal, India | PIN - 721302
See location in the Map
03222 282435
Mail: support@ndl.gov.in
Sl. Authority Responsibilities Communication Details
1 Ministry of Education (GoI),
Department of Higher Education
Sanctioning Authority https://www.education.gov.in/ict-initiatives
2 Indian Institute of Technology Kharagpur Host Institute of the Project: The host institute of the project is responsible for providing infrastructure support and hosting the project https://www.iitkgp.ac.in
3 National Digital Library of India Office, Indian Institute of Technology Kharagpur The administrative and infrastructural headquarters of the project Dr. B. Sutradhar  bsutra@ndl.gov.in
4 Project PI / Joint PI Principal Investigator and Joint Principal Investigators of the project Dr. B. Sutradhar  bsutra@ndl.gov.in
Prof. Saswat Chakrabarti  will be added soon
5 Website/Portal (Helpdesk) Queries regarding NDLI and its services support@ndl.gov.in
6 Contents and Copyright Issues Queries related to content curation and copyright issues content@ndl.gov.in
7 National Digital Library of India Club (NDLI Club) Queries related to NDLI Club formation, support, user awareness program, seminar/symposium, collaboration, social media, promotion, and outreach clubsupport@ndl.gov.in
8 Digital Preservation Centre (DPC) Assistance with digitizing and archiving copyright-free printed books dpc@ndl.gov.in
9 IDR Setup or Support Queries related to establishment and support of Institutional Digital Repository (IDR) and IDR workshops idr@ndl.gov.in
I will try my best to help you...
Cite this Content
Loading...