A Survey on Secure Environments for Malware Analysis

سال انتشار: 1393
نوع سند: مقاله کنفرانسی
زبان: انگلیسی
مشاهده: 878

فایل این مقاله در 10 صفحه با فرمت PDF قابل دریافت می باشد

استخراج به نرم افزارهای پژوهشی:

لینک ثابت به این مقاله:

شناسه ملی سند علمی:

CITCONF02_347

تاریخ نمایه سازی: 19 اردیبهشت 1395

چکیده مقاله:

Any software that causes any harm to users, computers and networks are known as malware. Since a malware is released, installed and spread rapidly, static analysis (signature-based) is not efficient enough due to the techniques such as obfuscation, therefore dynamic analysis (behavior-based) is preferred. Dynamic analysis involves executing the malicious code, thus, in order to prevent possible damages to the operating system and enhance its security, malware must be run in an environment similar to the real one. These secure environments may provide detection operations by creating an isolated space for running malware, analyzing the process and preparing a report. Safe and secure environments expand in wide range; from an implementation of simple wrapping software for personal computers; to a design of a robust microkernel for smartphones. In this research, once familiar with malwares and methods, introduction and evaluation of secure environments in personal computers and smartphones will be discussed.

نویسندگان

saeed Parsa

Associate Professor Faculty of Computer Iran University of Science and Technology

maryam Derakhshankar

master Computer Engineering,Iran University of Science and Technology

مراجع و منابع این مقاله:

لیست زیر مراجع و منابع استفاده شده در این مقاله را نمایش می دهد. این مراجع به صورت کاملا ماشینی و بر اساس هوش مصنوعی استخراج شده اند و لذا ممکن است دارای اشکالاتی باشند که به مرور زمان دقت استخراج این محتوا افزایش می یابد. مراجعی که مقالات مربوط به آنها در سیویلیکا نمایه شده و پیدا شده اند، به خود مقاله لینک شده اند :
  • Derakhshankar. M, (2014), "Specific Methods for Behavior Analysis of Malware ...
  • Vinod, P., Laxmi, V., Gaur, M.S., (2009), "Survey on Malware ...
  • Gandotra, E., Bansal, D., Sofat, S., (2014), "Malware Analysis and ...
  • Mathur, M., Hiranwal, S., (2013), _ Survey on Techniques in ...
  • Egele, M., Scholte, T., Kirda, E., Kruegel, C., (2012), "A ...
  • Idika, N., Mathur, A. P., (2007), "A Survey of Malware ...
  • Willems, C., Holz, T., Freiling, F., (2007), "Toward Automated Dynamic ...
  • The KB, National Library of the Netherland, (2014), "What Is ...
  • Turban, E., King, D., Lee, J., Viehland, D., (2008), "Chapter ...
  • Faas, R., (2012), "New Trend in BYOD Security: Contain the ...
  • Jacob, G., Debar, H., Filiol, E., (2008), "Behavioral Detection of ...
  • Khalili, A., (2011), "Preservation of Running Code from Security Threats ...
  • Goldberg, I., Wagner, D., Thomas, _ Brewer, E. A. (1996), ...
  • Mohammadzad eh, A., (2013), "Design and Implementation of Beha vior-based ...
  • Aycock, J., (2006), "Computer Viruses and Malware", Springer US, Vol. ...
  • Spitzner, L., (2002), "Honeypots: Tracking Hackers", Addi son-Wesley Longman Publishing ...
  • Polla, M.L., Martinelli, F., Sgandurra, D., (2012), _ Survey on ...
  • Felt A.P., Finifter, M., Chin, E., Hanna S., Wagner, D., ...
  • Yang, C.Q., (2003), "Operating System Security and Secure operating Systems ...
  • Li, B., Reshetova, E., Aura, T., (2010), "Symbian OS Platform ...
  • Apple Inc., (2014), "iOS Security", https ://www. apple _ _ ...
  • Achara, J.P., Castelluccia, _ (2012), "Smartphone Security Overview", Lecture in ...
  • NICTA Group, (2014), :Secure Microkerhel Project (seL4)", http ://s srg ...
  • QNX Software Systems, (2014), "QNX Operating Systems ", http : ...
  • نمایش کامل مراجع