Misleading Modern Malware

نویسنده

  • Daniel Bilar
چکیده

For practical purposes, information-gain adversarial malware may soon become undetectable using current function-based signaturematching AV techniques. We propose and sketch defenses that adopt an interactive approach, based on controlling information-centric KullbackLeibler distances.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Survey on Malware Propagation Analysis and Prevention Model

In recent years, the security threats imposed by email-based malware, modeling the propagation analysis and prevention of email malware becomes a fundamental technique for predicting its potential damages and developing effective countermeasures. Compared to earlier versions of mail malware, modern email malware exhibits two new features. One is reinfection and another one is self-start. In rei...

متن کامل

A Survey on Malware Propagation Analysis and Prevention Model

In recent years, the security threats imposed by email-based malware, modeling the propagation analysis and prevention of email malware becomes a fundamental technique for predicting its potential damages and developing effective countermeasures. Compared to earlier versions of mail malware, modern email malware exhibits two new features. One is reinfection and another one is self-start. In rei...

متن کامل

EnMobile: Entity-based Characterization and Analysis of Mobile Malware

Modern mobile malware tend to conduct their malicious exploits through sophisticated patterns of interactions that involve multiple entities, e.g., the mobile platform, human users, and network locations. Such malware often evade the detection by existing approaches due to their limited expressiveness and accuracy in characterizing and detecting these malware. To address these issues, in this p...

متن کامل

Poster Misleading Metrics: On Evaluating ML for Malware with Confidence

Malware poses a serious and challenging threat and due to the sheer scale the need for automated learning-based approaches to deal with it has become rapidly clear. Swift analysis and prompt detection of these threats present one of the most pressing and important issues that plague the security of the Internet and its users. With more than 550,000 unique malware samples per day reported in Q4 ...

متن کامل

PE-Header-Based Malware Study and Detection

In this paper, I present a simple and faster apporach to distinguish between malware and legitimate .exe files by simply looking at properties of the MS Windows Portable Executable (PE) headers. We extract distinguishing features from the PEheaders using the structural information standardized by the Miscrosoft Windows operating system for executables. I use the following three methodology: (1)...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2007