Dynamic malware analysis in the modern era—A state of the art survey

O Or-Meir, N Nissim, Y Elovici, L Rokach - ACM Computing Surveys …, 2019 - dl.acm.org
Although malicious software (malware) has been around since the early days of computers,
the sophistication and innovation of malware has increased over the years. In particular, the …

A survey on hypervisor-based monitoring: approaches, applications, and evolutions

E Bauman, G Ayoade, Z Lin - ACM Computing Surveys (CSUR), 2015 - dl.acm.org
When designing computer monitoring systems, one goal has always been to have a
complete view of the monitored target and at the same time stealthily protect the monitor …

{DroidScope}: Seamlessly reconstructing the {OS} and dalvik semantic views for dynamic android malware analysis

LK Yan, H Yin - 21st USENIX security symposium (USENIX security 12), 2012 - usenix.org
The prevalence of mobile platforms, the large market share of Android, plus the openness of
the Android Market makes it a hot target for malware attacks. Once a malware sample has …

[PDF][PDF] Scalable, behavior-based malware clustering.

U Bayer, PM Comparetti, C Hlauschek, C Kruegel… - NDSS, 2009 - eurecom.eu
Anti-malware companies receive thousands of malware samples every day. To process this
large quantity, a number of automated analysis tools were developed. These tools execute a …

BitBlaze: A new approach to computer security via binary analysis

D Song, D Brumley, H Yin, J Caballero, I Jager… - … Systems Security: 4th …, 2008 - Springer
In this paper, we give an overview of the BitBlaze project, a new approach to computer
security via binary analysis. In particular, BitBlaze focuses on building a unified binary …

Hypersafe: A lightweight approach to provide lifetime hypervisor control-flow integrity

Z Wang, X Jiang - 2010 IEEE symposium on security and …, 2010 - ieeexplore.ieee.org
Virtualization is being widely adopted in today's computing systems. Its unique security
advantages in isolating and introspecting commodity OSes as virtual machines (VMs) have …

[PDF][PDF] Dta++: dynamic taint analysis with targeted control-flow propagation.

MG Kang, S McCamant, P Poosankam, D Song - NDSS, 2011 - people.eecs.berkeley.edu
Dynamic taint analysis (DTA) is a powerful technique for, among other things, tracking the
flow of sensitive information. However, it is vulnerable to false negative errors caused by …

Malware investigation by analyzing computer memory

M Peinado, W Cui - US Patent 8,566,944, 2013 - Google Patents
Technology is described for malware investigation by analyZ ing computer memory in a
computing device. The method can include performing static analysis on code for a software …

Lares: An architecture for secure active monitoring using virtualization

BD Payne, M Carbone, M Sharif… - 2008 IEEE Symposium …, 2008 - ieeexplore.ieee.org
Host-based security tools such as anti-virus and intrusion detection systems are not
adequately protected on today's computers. Malware is often designed to immediately …

Countering kernel rootkits with lightweight hook protection

Z Wang, X Jiang, W Cui, P Ning - … of the 16th ACM conference on …, 2009 - dl.acm.org
Kernel rootkits have posed serious security threats due to their stealthy manner. To hide
their presence and activities, many rootkits hijack control flows by modifying control data or …