HEAVEN: A Hardware-Enhanced AntiVirus ENgine to accelerate real-time, signature-based malware detection
Antiviruses (AVs) are computing-intensive applications that rely on constant monitoring of
OS events and on applying pattern matching procedures on binaries to detect malware. In …
OS events and on applying pattern matching procedures on binaries to detect malware. In …
Challenges and pitfalls in malware research
As the malware research field became more established over the last two decades, new
research questions arose, such as how to make malware research reproducible, how to …
research questions arose, such as how to make malware research reproducible, how to …
Antiviruses under the microscope: A hands-on perspective
AntiViruses (AVs) are the main defense line against attacks for most users and much
research has been done about them, especially proposing new detection procedures that …
research has been done about them, especially proposing new detection procedures that …
Shallow security: On the creation of adversarial variants to evade machine learning-based malware detectors
The use of Machine Learning (ML) techniques for malware detection has been a trend in the
last two decades. More recently, researchers started to investigate adversarial approaches …
last two decades. More recently, researchers started to investigate adversarial approaches …
The need for speed: An analysis of brazilian malware classifiers
Using a dataset containing about 50,000 samples from Brazilian cyberspace, we show that
relying solely on conventional machine-learning systems without taking into account the …
relying solely on conventional machine-learning systems without taking into account the …
Parent process termination: an adversarial technique for persistent malware
Persistent malware use techniques, such as obfuscation, process injection, and system call
abuse to evade security mechanisms and avoid detection throughout their compromise …
abuse to evade security mechanisms and avoid detection throughout their compromise …
One size does not fit all: A longitudinal analysis of brazilian financial malware
Malware analysis is an essential task to understand infection campaigns, the behavior of
malicious codes, and possible ways to mitigate threats. Malware analysis also allows better …
malicious codes, and possible ways to mitigate threats. Malware analysis also allows better …
Terminator: A Secure Coprocessor to Accelerate Real-Time AntiViruses Using Inspection Breakpoints
AntiViruses (AVs) are essential to face the myriad of malware threatening Internet users. AVs
operate in two modes: on-demand checks and real-time verification. Software-based real …
operate in two modes: on-demand checks and real-time verification. Software-based real …
Enhancing branch monitoring for security purposes: From control flow integrity to malware analysis and debugging
Malware and code-reuse attacks are the most significant threats to current systems
operation. Solutions developed to countermeasure them have their weaknesses exploited …
operation. Solutions developed to countermeasure them have their weaknesses exploited …
A praise for defensive programming: Leveraging uncertainty for effective malware mitigation
A promising avenue for improving the effectiveness of behavioral-based malware detectors
is to leverage two-phase detection mechanisms. Existing problem in two-phase detection is …
is to leverage two-phase detection mechanisms. Existing problem in two-phase detection is …