[PDF][PDF] Effective and efficient malware detection at the end host.

C Kolbitsch, PM Comparetti, C Kruegel… - USENIX security …, 2009‏ - usenix.org
Malware is one of the most serious security threats on the Internet today. In fact, most
Internet problems such as spam e-mails and denial of service attacks have malware as their …

Systems and methods for detecting and inhibiting attacks using honeypots

S Sidiroglou, AD Keromytis… - US Patent 7,904,959, 2011‏ - Google Patents
In accordance with some embodiments, systems and methods that protect an application
from attacks are provided. In some embodiments, tra? ic from a communication network is …

DROP: Detecting return-oriented programming malicious code

P Chen, H **ao, X Shen, X Yin, B Mao, L **e - … Systems Security: 5th …, 2009‏ - Springer
Abstract Return-Oriented Programming (ROP) is a new technique that helps the attacker
construct malicious code mounted on x86/SPARC executables without any function call at …

[PDF][PDF] Detecting Targeted Attacks Using Shadow Honeypots.

KG Anagnostakis, S Sidiroglou, P Akritidis… - USENIX Security …, 2005‏ - usenix.org
Abstract We present Shadow Honeypots, a novel hybrid architecture that combines the best
features of honeypots and anomaly detection. At a high level, we use a variety of anomaly …

The taser intrusion recovery system

A Goel, K Po, K Farhadi, Z Li, E De Lara - Proceedings of the twentieth …, 2005‏ - dl.acm.org
Recovery from intrusions is typically a very time-consuming operation in current systems. At
a time when the cost of human resources dominates the cost of computing resources, we …

[PDF][PDF] {AdJail}: Practical Enforcement of Confidentiality and Integrity Policies on Web Advertisements

M Ter Louw, KT Ganesh… - 19th USENIX Security …, 2010‏ - usenix.org
Web publishers frequently integrate third-party advertisements into web pages that also
contain sensitive publisher data and end-user personal data. This practice exposes …

Inspector gadget: Automated extraction of proprietary gadgets from malware binaries

C Kolbitsch, T Holz, C Kruegel… - 2010 IEEE Symposium …, 2010‏ - ieeexplore.ieee.org
Unfortunately, malicious software is still an unsolved problem and a major threat on the
Internet. An important component in the fight against malicious software is the analysis of …

The state of the art of application restrictions and sandboxes: A survey of application-oriented access controls and their shortfalls

ZC Schreuders, T McGill, C Payne - Computers & Security, 2013‏ - Elsevier
Under most widely-used security mechanisms the programs users run possess more
authority than is strictly necessary, with each process typically capable of utilising all of the …

A feather-weight virtual machine for windows applications

Y Yu, F Guo, S Nanda, L Lam, T Chiueh - Proceedings of the 2nd …, 2006‏ - dl.acm.org
Many fault-tolerant and intrusion-tolerant systems require the ability to execute unsafe
programs in a realistic environment without leaving permanent damages. Virtual machine …

Njas: Sandboxing unmodified applications in non-rooted devices running stock android

A Bianchi, Y Fratantonio, C Kruegel… - Proceedings of the 5th …, 2015‏ - dl.acm.org
Malware poses a serious threat to the Android ecosystem. Moreover, even benign
applications can sometimes constitute security and privacy risks to their users, as they might …