Authors
Xu Chen, Jon Andersen, Z Morley Mao, Michael Bailey, Jose Nazario
Publication date
2008/6/24
Conference
Dependable Systems and Networks With FTCS and DCC, 2008. DSN 2008. IEEE International Conference on
Pages
177-186
Publisher
Ieee
Description
Many threats that plague today’s networks (e.g., phishing, botnets, denial of service attacks) are enabled by a complex ecosystem of attack programs commonly called malware. To combat these threats, defenders of these networks have turned to the collection, analysis, and reverse engineering of malware as mechanisms to understand these programs, generate signatures, and facilitate cleanup of infected hosts. Recently however, new malware instances have emerged with the capability to check and often thwart these defensive activities — essentially leaving defenders blind to their activities. To combat this emerging threat, we have undertaken a robust analysis of current malware and developed a detailed taxonomy of malware defender fingerprinting methods. We demonstrate the utility of this taxonomy by using it to characterize the prevalence of these avoidance methods, to generate a novel fingerprinting …
Total citations
20092010201120122013201420152016201720182019202020212022202320247183227304346444249382830271812
Scholar articles
X Chen, J Andersen, ZM Mao, M Bailey, J Nazario - 2008 IEEE international conference on dependable …, 2008