Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Dynamic malware analysis in the modern era—A state of the art survey
Although malicious software (malware) has been around since the early days of computers,
the sophistication and innovation of malware has increased over the years. In particular, the …
the sophistication and innovation of malware has increased over the years. In particular, the …
A survey on hypervisor-based monitoring: approaches, applications, and evolutions
When designing computer monitoring systems, one goal has always been to have a
complete view of the monitored target and at the same time stealthily protect the monitor …
complete view of the monitored target and at the same time stealthily protect the monitor …
{DroidScope}: Seamlessly reconstructing the {OS} and dalvik semantic views for dynamic android malware analysis
LK Yan, H Yin - 21st USENIX security symposium (USENIX security 12), 2012 - usenix.org
The prevalence of mobile platforms, the large market share of Android, plus the openness of
the Android Market makes it a hot target for malware attacks. Once a malware sample has …
the Android Market makes it a hot target for malware attacks. Once a malware sample has …
[PDF][PDF] Scalable, behavior-based malware clustering.
Anti-malware companies receive thousands of malware samples every day. To process this
large quantity, a number of automated analysis tools were developed. These tools execute a …
large quantity, a number of automated analysis tools were developed. These tools execute a …
BitBlaze: A new approach to computer security via binary analysis
In this paper, we give an overview of the BitBlaze project, a new approach to computer
security via binary analysis. In particular, BitBlaze focuses on building a unified binary …
security via binary analysis. In particular, BitBlaze focuses on building a unified binary …
Hypersafe: A lightweight approach to provide lifetime hypervisor control-flow integrity
Virtualization is being widely adopted in today's computing systems. Its unique security
advantages in isolating and introspecting commodity OSes as virtual machines (VMs) have …
advantages in isolating and introspecting commodity OSes as virtual machines (VMs) have …
[PDF][PDF] Dta++: dynamic taint analysis with targeted control-flow propagation.
Dynamic taint analysis (DTA) is a powerful technique for, among other things, tracking the
flow of sensitive information. However, it is vulnerable to false negative errors caused by …
flow of sensitive information. However, it is vulnerable to false negative errors caused by …
Malware investigation by analyzing computer memory
M Peinado, W Cui - US Patent 8,566,944, 2013 - Google Patents
Technology is described for malware investigation by analyZ ing computer memory in a
computing device. The method can include performing static analysis on code for a software …
computing device. The method can include performing static analysis on code for a software …
Lares: An architecture for secure active monitoring using virtualization
BD Payne, M Carbone, M Sharif… - 2008 IEEE Symposium …, 2008 - ieeexplore.ieee.org
Host-based security tools such as anti-virus and intrusion detection systems are not
adequately protected on today's computers. Malware is often designed to immediately …
adequately protected on today's computers. Malware is often designed to immediately …
Countering kernel rootkits with lightweight hook protection
Kernel rootkits have posed serious security threats due to their stealthy manner. To hide
their presence and activities, many rootkits hijack control flows by modifying control data or …
their presence and activities, many rootkits hijack control flows by modifying control data or …