Skip to main content
Book cover

Malware Detection

  • Conference proceedings
  • © 2007

Overview

  • Cutting-edge behavior-based techniques to analyze & detect obfuscated malware
  • Analyzes current trends in malware activity online, including botnets and malicious code for profit
  • Proposes effective models for detection & prevention of attacks using cooperation & collaboration between detectors
  • Introduces novel techniques for creating services that protect their own integrity and safety, plus the data they manage
  • Includes supplementary material: sn.pub/extras

Part of the book series: Advances in Information Security (ADIS, volume 27)

This is a preview of subscription content, log in via an institution to check access.

Access this book

eBook USD 259.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 329.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book USD 329.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

Licence this eBook for your library

Institutional subscriptions

Table of contents (13 papers)

  1. Overview

  2. Software Analysis and Assurance

  3. Distributed Threat Detection and Defense

  4. Stealthy and Targeted Threat Detection and Defense

  5. Novel Techniques for Constructing Trustworthy Services

Keywords

About this book

Shared resources, such as the Internet, have created a highly interconnected cyber-infrastructure. Critical infrastructures in domains such as medical, power, telecommunications, and finance are highly dependent on information systems. These two factors have exposed our critical infrastructures to malicious attacks and accidental failures. Many malicious attacks are achieved by malicious code or malware, such as viruses and worms. Given the deleterious affects of malware on our cyber infrastructure, identifying malicious programs is an important goal. Unfortunately, malware detectors have not kept pace with the evasion techniques commonly used by hackers, i.e., the good guys are falling behind in the arms race.

Malware Detection captures the state of the art research in the area of malicious code detection, prevention and mitigation.

Editors and Affiliations

  • Computer Sciences Department, University of Wisconsin, Madison

    Mihai Christodorescu, Somesh Jha

  • Dept. of Homeland Security, Washington D.C.

    Douglas Maughan

  • Carnegie Mellon University, Pittsburgh

    Dawn Song

  • Computing and Information Science Div., U.S. Army Research Office, Research Triangle Park, NC

    Cliff Wang

Bibliographic Information

Publish with us