Efficient Exploring Multiple Execution Path for Dynamic Malware Analysis
نویسندگان
چکیده
منابع مشابه
Toward Efficient Dynamic Analysis and Testing for Android Malware
Nowadays, Android-based mobile devices, such as smartphones and tablets, have become increasingly popular, and the number of Android applications is growing dramatically. To examine and validate such a high volume of applications, an automated testing and analysis environment is needed. Such an environment is particularly useful for the detection of malicious applications which steal the users’...
متن کاملMultiple-path execution for chip multiprocessors
The increased dependence of clock cycle time on interconnect delay favors chip multiprocessors (CMP) as the basis for future microprocessor designs. The tight coupling of processing units in a CMP allows new forms of parallelism to be exploited. This paper studies multiple-path execution (MPE) on a CMP design to provide speedup on unmodified sequential code by exploring different paths of a con...
متن کاملThreaded Multiple Path Execution Steven
This paper presents Threaded Multi-Path Execution (TME), which exploits existing hardware on a Simultaneous Multithreading (SMT) processor to speculatively execute multiple paths of execution. When there are fewer threads in an SMT processor than hardware contexts, threaded multi-path execution uses spare contexts to fetch and execute code along the less likely path of hard-to-predict branches....
متن کاملAnalysis of Dynamic Structures for Efficient Parallel Execution
Programs written in high-level programming languages and in particular object-oriented languages make heavy use of references and dynamically allocated structures. As a result, precise analysis of such features is critical for producing eecient implementations. The information produced by this analysis is invaluable for compiling programs for both sequential and parallel machines. This paper pr...
متن کاملTargeted Dynamic Analysis for Android Malware
Targeted Dynamic Analysis for Android Malware Michelle Wong Master of Applied Science Graduate Department of Electrical and Computer Engineering University of Toronto 2015 The identification and analysis of Android malware involves either static or dynamic program analysis of the malware binary. While static analysis has good code coverage, it is not as precise due to the lack of run-time infor...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of the Korea Institute of Information Security and Cryptology
سال: 2016
ISSN: 1598-3986
DOI: 10.13089/jkiisc.2016.26.2.377