A Survey on Secure Environments for Malware Analysis

Publish Year: 1393
نوع سند: مقاله کنفرانسی
زبان: English
View: 872

This Paper With 10 Page And PDF Format Ready To Download

  • Certificate
  • من نویسنده این مقاله هستم

استخراج به نرم افزارهای پژوهشی:

لینک ثابت به این Paper:

شناسه ملی سند علمی:

CITCONF02_347

تاریخ نمایه سازی: 19 اردیبهشت 1395

Abstract:

Any software that causes any harm to users, computers and networks are known as malware. Since a malware is released, installed and spread rapidly, static analysis (signature-based) is not efficient enough due to the techniques such as obfuscation, therefore dynamic analysis (behavior-based) is preferred. Dynamic analysis involves executing the malicious code, thus, in order to prevent possible damages to the operating system and enhance its security, malware must be run in an environment similar to the real one. These secure environments may provide detection operations by creating an isolated space for running malware, analyzing the process and preparing a report. Safe and secure environments expand in wide range; from an implementation of simple wrapping software for personal computers; to a design of a robust microkernel for smartphones. In this research, once familiar with malwares and methods, introduction and evaluation of secure environments in personal computers and smartphones will be discussed.

Authors

saeed Parsa

Associate Professor Faculty of Computer Iran University of Science and Technology

maryam Derakhshankar

master Computer Engineering,Iran University of Science and Technology

مراجع و منابع این Paper:

لیست زیر مراجع و منابع استفاده شده در این Paper را نمایش می دهد. این مراجع به صورت کاملا ماشینی و بر اساس هوش مصنوعی استخراج شده اند و لذا ممکن است دارای اشکالاتی باشند که به مرور زمان دقت استخراج این محتوا افزایش می یابد. مراجعی که مقالات مربوط به آنها در سیویلیکا نمایه شده و پیدا شده اند، به خود Paper لینک شده اند :
  • Derakhshankar. M, (2014), "Specific Methods for Behavior Analysis of Malware ...
  • Vinod, P., Laxmi, V., Gaur, M.S., (2009), "Survey on Malware ...
  • Gandotra, E., Bansal, D., Sofat, S., (2014), "Malware Analysis and ...
  • Mathur, M., Hiranwal, S., (2013), _ Survey on Techniques in ...
  • Egele, M., Scholte, T., Kirda, E., Kruegel, C., (2012), "A ...
  • Idika, N., Mathur, A. P., (2007), "A Survey of Malware ...
  • Willems, C., Holz, T., Freiling, F., (2007), "Toward Automated Dynamic ...
  • The KB, National Library of the Netherland, (2014), "What Is ...
  • Turban, E., King, D., Lee, J., Viehland, D., (2008), "Chapter ...
  • Faas, R., (2012), "New Trend in BYOD Security: Contain the ...
  • Jacob, G., Debar, H., Filiol, E., (2008), "Behavioral Detection of ...
  • Khalili, A., (2011), "Preservation of Running Code from Security Threats ...
  • Goldberg, I., Wagner, D., Thomas, _ Brewer, E. A. (1996), ...
  • Mohammadzad eh, A., (2013), "Design and Implementation of Beha vior-based ...
  • Aycock, J., (2006), "Computer Viruses and Malware", Springer US, Vol. ...
  • Spitzner, L., (2002), "Honeypots: Tracking Hackers", Addi son-Wesley Longman Publishing ...
  • Polla, M.L., Martinelli, F., Sgandurra, D., (2012), _ Survey on ...
  • Felt A.P., Finifter, M., Chin, E., Hanna S., Wagner, D., ...
  • Yang, C.Q., (2003), "Operating System Security and Secure operating Systems ...
  • Li, B., Reshetova, E., Aura, T., (2010), "Symbian OS Platform ...
  • Apple Inc., (2014), "iOS Security", https ://www. apple _ _ ...
  • Achara, J.P., Castelluccia, _ (2012), "Smartphone Security Overview", Lecture in ...
  • NICTA Group, (2014), :Secure Microkerhel Project (seL4)", http ://s srg ...
  • QNX Software Systems, (2014), "QNX Operating Systems ", http : ...
  • نمایش کامل مراجع