Quantifying Malware Evolution through Archaeology

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Archaeology and cognitive evolution.

Archaeology can provide two bodies of information relevant to the understanding of the evolution of human cognition--the timing of developments, and the evolutionary context of these developments. The challenge is methodological. Archaeology must document attributes that have direct implications for underlying cognitive mechanisms. One example of such a cognitive archaeology is found in spatial...

متن کامل

Degradation archaeology: studying software flaws’ evolution

Given that software evolution depends on the ability to keep the knowledge about the system and the architectural integrity, research has been focussed on how to ease code comprehension and how to avoid architectural decay. Although these approaches have demonstrated to be useful, the lack of understanding of software degradation inhibits us to tackle it more adequately. Our position is that by...

متن کامل

Malware Detection Through Call Graphs

Each day, anti-virus companies receive large quantities of potentially harmful executables. Many of the malicious samples among these executables are variations of earlier encountered malware, created by their authors to evade pattern-based detection. Consequently, robust detection approaches are required, capable of recognizing similar samples automatically. In this thesis, malware detection t...

متن کامل

Targeted Threat Index: Characterizing and Quantifying Politically-Motivated Targeted Malware

Targeted attacks on civil society and non-governmental organizations have gone underreported despite the fact that these organizations have been shown to be frequent targets of these attacks. In this paper, we shed light on targeted malware attacks faced by these organizations by studying malicious e-mails received by 10 civil society organizations (the majority of which are from groups related...

متن کامل

Quantifying schema evolution

Achieving correct changes is the dominant activity in the application software industry. Modification of database schemata is one kind of change which may have severe consequences for database applications. The paper presents a method for measuring modifications to database schemata and their consequences, by using a thesaurus tool. Measurements of the evolution of a large-scale database applic...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Journal of Information Security

سال: 2015

ISSN: 2153-1234,2153-1242

DOI: 10.4236/jis.2015.62011