A survey on malware detection using data mining techniques

Y Ye, T Li, D Adjeroh, SS Iyengar - ACM Computing Surveys (CSUR), 2017 - dl.acm.org
In the Internet age, malware (such as viruses, trojans, ransomware, and bots) has posed
serious and evolving security threats to Internet users. To protect legitimate users from these …

A survey on zero-day polymorphic worm detection techniques

R Kaur, M Singh - IEEE Communications Surveys & Tutorials, 2014 - ieeexplore.ieee.org
Zero-day polymorphic worms pose a serious threat to the Internet security. With their ability
to rapidly propagate, these worms increasingly threaten the Internet hosts and services. Not …

All you ever wanted to know about dynamic taint analysis and forward symbolic execution (but might have been afraid to ask)

EJ Schwartz, T Avgerinos… - 2010 IEEE symposium on …, 2010 - ieeexplore.ieee.org
Dynamic taint analysis and forward symbolic execution are quickly becoming staple
techniques in security analyses. Example applications of dynamic taint analysis and forward …

Integrated static and dynamic analysis for malware detection

PV Shijo, A Salim - Procedia Computer Science, 2015 - Elsevier
The number of malware is increasing rapidly regardless of the common use of anti-malware
software. Detection of malware continues to be a challenge as attackers device new …

Systems, methods, and media for detecting network anomalies using a trained probabilistic model

Y Song, AD Keromytis, SJ Stolfo - US Patent 8,844,033, 2014 - Google Patents
Abstract Systems, methods, and media for detecting network anomalies are provided. In
some embodiments, a training dataset of communication protocol messages having …

[PDF][PDF] Dta++: dynamic taint analysis with targeted control-flow propagation.

MG Kang, S McCamant, P Poosankam, D Song - NDSS, 2011 - people.eecs.berkeley.edu
Dynamic taint analysis (DTA) is a powerful technique for, among other things, tracking the
flow of sensitive information. However, it is vulnerable to false negative errors caused by …

Systems, methods, and media for outputting data based upon anomaly detection

SJ Stolfo, K Wang, J Parekh - US Patent 8,448,242, 2013 - Google Patents
Systems, methods, and media for outputting data based on anomaly detection are provided.
In some embodiments, methods for outputting data based on anomaly detection include …

Systems, methods, and media for outputting a dataset based upon anomaly detection

SJ Stolfo, K Wang, J Parekh - US Patent 8,381,299, 2013 - Google Patents
Systems, methods, and media for outputting a dataset based upon anomaly detection are
provided. In some embodiments, methods for outputting a dataset based upon anomaly …

Methods, media, and systems for detecting attack on a digital processing device

SJ Stolfo, WJ Li, AD Keromylis, E Androulaki - US Patent 8,789,172, 2014 - Google Patents
Methods, media, and systems for detecting attack are pro vided. In some embodiments, the
methods include: compar ing at least part of a document to a static detection model; …

Anagram: A content anomaly detector resistant to mimicry attack

K Wang, JJ Parekh, SJ Stolfo - … workshop on recent advances in intrusion …, 2006 - Springer
In this paper, we present Anagram, a content anomaly detector that models a mixture ofhigh-
order n-grams (n> 1) designed to detect anomalous and “suspicious” network packet …