Skip to main content
  • Conference proceedings
  • © 2007

Malware Detection

  • Cutting-edge behavior-based techniques to analyze & detect obfuscated malware
  • Analyzes current trends in malware activity online, including botnets and malicious code for profit
  • Proposes effective models for detection & prevention of attacks using cooperation & collaboration between detectors
  • Introduces novel techniques for creating services that protect their own integrity and safety, plus the data they manage
  • Includes supplementary material: sn.pub/extras

Part of the book series: Advances in Information Security (ADIS, volume 27)

Buy it now

Buying options

eBook USD 259.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 329.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book USD 329.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (13 papers)

  1. Front Matter

    Pages I-XI
  2. Overview

    1. Front Matter

      Pages 1-1
  3. Software Analysis and Assurance

    1. Front Matter

      Pages 17-17
    2. Static Disassembly and Code Analysis

      • Giovanni Vigna
      Pages 19-41
    3. A Next-Generation Platform for Analyzing Executables

      • Thomas Reps, Gogul Balakrishnan, Junghee Lim, Tim Teitelbaum
      Pages 43-61
    4. Detection and Prevention of SQL Injection Attacks

      • William G. J. Halfond, Alessandro Orso
      Pages 85-109
  4. Distributed Threat Detection and Defense

    1. Front Matter

      Pages 111-111
    2. Very Fast Containment of Scanning Worms, Revisited

      • Nicholas Weaver, Stuart Staniford, Vern paxson
      Pages 113-145
    3. Sting: An End-to-End Self-Healing System for Defending against Internet Worms

      • David Brumley, James Newsome, Dawn Song
      Pages 147-170
    4. An Inside Look at Botnets

      • Paul Barford, Vinod Yegneswaran
      Pages 171-191
    5. Can Cooperative Intrusion Detectors Challenge the Base-Rate Fallacy?

      • Mihai Christodorescu, Shai Rubin
      Pages 193-209
  5. Stealthy and Targeted Threat Detection and Defense

    1. Front Matter

      Pages 211-211
    2. Composite Hybrid Techniques For Defending Against Targeted Attacks

      • Stelios Sidiroglou, Angelos D. Keromytis
      Pages 213-229
    3. Towards Stealthy Malware Detection

      • Salvatore J. Stolfo, Ke Wang, Wei-Jen Li
      Pages 231-249
  6. Novel Techniques for Constructing Trustworthy Services

    1. Front Matter

      Pages 251-251
    2. Pioneer: Verifying Code Integrity and Enforcing Untampered Code Execution on Legacy Systems

      • Arvind Seshadri, Mark Luk, Adrian Perrig, Leendert van Doom, Pradeep Khosla
      Pages 253-289
    3. Principles of Secure Information Flow Analysis

      • Geoffrey Smith
      Pages 291-307
  7. Back Matter

    Pages 309-312

About this book

Shared resources, such as the Internet, have created a highly interconnected cyber-infrastructure. Critical infrastructures in domains such as medical, power, telecommunications, and finance are highly dependent on information systems. These two factors have exposed our critical infrastructures to malicious attacks and accidental failures. Many malicious attacks are achieved by malicious code or malware, such as viruses and worms. Given the deleterious affects of malware on our cyber infrastructure, identifying malicious programs is an important goal. Unfortunately, malware detectors have not kept pace with the evasion techniques commonly used by hackers, i.e., the good guys are falling behind in the arms race.

Malware Detection captures the state of the art research in the area of malicious code detection, prevention and mitigation.

Editors and Affiliations

  • Computer Sciences Department, University of Wisconsin, Madison

    Mihai Christodorescu, Somesh Jha

  • Dept. of Homeland Security, Washington D.C.

    Douglas Maughan

  • Carnegie Mellon University, Pittsburgh

    Dawn Song

  • Computing and Information Science Div., U.S. Army Research Office, Research Triangle Park, NC

    Cliff Wang

Bibliographic Information

Buy it now

Buying options

eBook USD 259.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 329.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book USD 329.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access