Quantifying Malware Evolution through Archaeology
نویسندگان
چکیده
منابع مشابه
Archaeology and cognitive evolution.
Archaeology can provide two bodies of information relevant to the understanding of the evolution of human cognition--the timing of developments, and the evolutionary context of these developments. The challenge is methodological. Archaeology must document attributes that have direct implications for underlying cognitive mechanisms. One example of such a cognitive archaeology is found in spatial...
متن کاملDegradation archaeology: studying software flaws’ evolution
Given that software evolution depends on the ability to keep the knowledge about the system and the architectural integrity, research has been focussed on how to ease code comprehension and how to avoid architectural decay. Although these approaches have demonstrated to be useful, the lack of understanding of software degradation inhibits us to tackle it more adequately. Our position is that by...
متن کاملMalware Detection Through Call Graphs
Each day, anti-virus companies receive large quantities of potentially harmful executables. Many of the malicious samples among these executables are variations of earlier encountered malware, created by their authors to evade pattern-based detection. Consequently, robust detection approaches are required, capable of recognizing similar samples automatically. In this thesis, malware detection t...
متن کاملTargeted Threat Index: Characterizing and Quantifying Politically-Motivated Targeted Malware
Targeted attacks on civil society and non-governmental organizations have gone underreported despite the fact that these organizations have been shown to be frequent targets of these attacks. In this paper, we shed light on targeted malware attacks faced by these organizations by studying malicious e-mails received by 10 civil society organizations (the majority of which are from groups related...
متن کاملQuantifying schema evolution
Achieving correct changes is the dominant activity in the application software industry. Modification of database schemata is one kind of change which may have severe consequences for database applications. The paper presents a method for measuring modifications to database schemata and their consequences, by using a thesaurus tool. Measurements of the evolution of a large-scale database applic...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of Information Security
سال: 2015
ISSN: 2153-1234,2153-1242
DOI: 10.4236/jis.2015.62011