A survey on automated dynamic malware-analysis techniques and tools
Anti-virus vendors are confronted with a multitude of potentially malicious samples today.
Receiving thousands of new samples every day is not uncommon. The signatures that …
Receiving thousands of new samples every day is not uncommon. The signatures that …
Memory encryption: A survey of existing techniques
M Henson, S Taylor - ACM Computing Surveys (CSUR), 2014 - dl.acm.org
Memory encryption has yet to be used at the core of operating system designs to provide
confidentiality of code and data. As a result, numerous vulnerabilities exist at every level of …
confidentiality of code and data. As a result, numerous vulnerabilities exist at every level of …
Ryoan: A distributed sandbox for untrusted computation on secret data
Users of modern data-processing services such as tax preparation or genomic screening
are forced to trust them with data that the users wish to keep secret. Ryoan1 protects secret …
are forced to trust them with data that the users wish to keep secret. Ryoan1 protects secret …
Taintdroid: an information-flow tracking system for realtime privacy monitoring on smartphones
Today's smartphone operating systems frequently fail to provide users with visibility into how
third-party applications collect and share their private data. We address these shortcomings …
third-party applications collect and share their private data. We address these shortcomings …
[PDF][PDF] Dynamic taint analysis for automatic detection, analysis, and signaturegeneration of exploits on commodity software.
J Newsome, DX Song - NDSS, 2005 - Citeseer
Software vulnerabilities have had a devastating effect on the Internet. Worms such as
CodeRed and Slammer can compromise hundreds of thousands of hosts within hours or …
CodeRed and Slammer can compromise hundreds of thousands of hosts within hours or …
BitBlaze: A new approach to computer security via binary analysis
In this paper, we give an overview of the BitBlaze project, a new approach to computer
security via binary analysis. In particular, BitBlaze focuses on building a unified binary …
security via binary analysis. In particular, BitBlaze focuses on building a unified binary …
Protracer: Towards practical provenance tracing by alternating between logging and tainting
ProTracer: towards practical provenance tracing by alternating between logging and
tainting Page 1 Please do not remove this page ProTracer: towards practical provenance …
tainting Page 1 Please do not remove this page ProTracer: towards practical provenance …
[PDF][PDF] Towards a Timely Causality Analysis for Enterprise Security.
The increasingly sophisticated Advanced Persistent Threat (APT) attacks have become a
serious challenge for enterprise IT security. Attack causality analysis, which tracks multi-hop …
serious challenge for enterprise IT security. Attack causality analysis, which tracks multi-hop …
Panorama: capturing system-wide information flow for malware detection and analysis
Malicious programs spy on users' behavior and compromise their privacy. Even software
from reputable vendors, such as Google Desktop and Sony DRM media player, may perform …
from reputable vendors, such as Google Desktop and Sony DRM media player, may perform …
SoK: Sanitizing for security
The C and C++ programming languages are notoriously insecure yet remain indispensable.
Developers therefore resort to a multi-pronged approach to find security issues before …
Developers therefore resort to a multi-pronged approach to find security issues before …