A survey on automated dynamic malware-analysis techniques and tools

M Egele, T Scholte, E Kirda, C Kruegel - ACM computing surveys (CSUR …, 2008 - dl.acm.org
Anti-virus vendors are confronted with a multitude of potentially malicious samples today.
Receiving thousands of new samples every day is not uncommon. The signatures that …

Memory encryption: A survey of existing techniques

M Henson, S Taylor - ACM Computing Surveys (CSUR), 2014 - dl.acm.org
Memory encryption has yet to be used at the core of operating system designs to provide
confidentiality of code and data. As a result, numerous vulnerabilities exist at every level of …

Ryoan: A distributed sandbox for untrusted computation on secret data

T Hunt, Z Zhu, Y Xu, S Peter, E Witchel - ACM Transactions on Computer …, 2018 - dl.acm.org
Users of modern data-processing services such as tax preparation or genomic screening
are forced to trust them with data that the users wish to keep secret. Ryoan1 protects secret …

Taintdroid: an information-flow tracking system for realtime privacy monitoring on smartphones

W Enck, P Gilbert, S Han, V Tendulkar… - ACM Transactions on …, 2014 - dl.acm.org
Today's smartphone operating systems frequently fail to provide users with visibility into how
third-party applications collect and share their private data. We address these shortcomings …

[PDF][PDF] Dynamic taint analysis for automatic detection, analysis, and signaturegeneration of exploits on commodity software.

J Newsome, DX Song - NDSS, 2005 - Citeseer
Software vulnerabilities have had a devastating effect on the Internet. Worms such as
CodeRed and Slammer can compromise hundreds of thousands of hosts within hours or …

BitBlaze: A new approach to computer security via binary analysis

D Song, D Brumley, H Yin, J Caballero, I Jager… - … Systems Security: 4th …, 2008 - Springer
In this paper, we give an overview of the BitBlaze project, a new approach to computer
security via binary analysis. In particular, BitBlaze focuses on building a unified binary …

Protracer: Towards practical provenance tracing by alternating between logging and tainting

S Ma, X Zhang, D Xu - 23rd Annual Network And …, 2016 - scholarship.libraries.rutgers.edu
ProTracer: towards practical provenance tracing by alternating between logging and
tainting Page 1 Please do not remove this page ProTracer: towards practical provenance …

[PDF][PDF] Towards a Timely Causality Analysis for Enterprise Security.

Y Liu, M Zhang, D Li, K Jee, Z Li, Z Wu, J Rhee, P Mittal - NDSS, 2018 - princeton.edu
The increasingly sophisticated Advanced Persistent Threat (APT) attacks have become a
serious challenge for enterprise IT security. Attack causality analysis, which tracks multi-hop …

Panorama: capturing system-wide information flow for malware detection and analysis

H Yin, D Song, M Egele, C Kruegel… - Proceedings of the 14th …, 2007 - dl.acm.org
Malicious programs spy on users' behavior and compromise their privacy. Even software
from reputable vendors, such as Google Desktop and Sony DRM media player, may perform …

SoK: Sanitizing for security

D Song, J Lettner, P Rajasekaran, Y Na… - … IEEE Symposium on …, 2019 - ieeexplore.ieee.org
The C and C++ programming languages are notoriously insecure yet remain indispensable.
Developers therefore resort to a multi-pronged approach to find security issues before …