Zobrazeno 1 - 7
of 7
pro vyhledávání: '"Kirat Dhilung Hang"'
Autor:
Jialong Zhang, Xiaokui Shu, Marc Ph. Stoecklin, Jiyong Jang, Kirat Dhilung Hang, Heqing Huang, Zhongshu Gu
Publikováno v:
DSN
Security analysts widely use dynamic malware analysis environments to exercise malware samples and derive virus signatures. Unfortunately, malware authors are becoming more aware of such analysis environments. Therefore, many have embedded evasive lo
Autor:
Marc Ph. Stoecklin, Jiyong Jang, Kirat Dhilung Hang, Josyula R. Rao, Xin Hu, Ting Wang, Douglas Lee Schales
Publikováno v:
DSN
Sophisticated cyber security threats, such as advanced persistent threats, rely on infecting end points within a targeted security domain and embedding malware. Typically, such malware periodically reaches out to the command and control infrastructur
Autor:
Giovanni Vigna, Christopher Kruegel, Simone Mutti, Yanick Fratantonio, Luca Invernizzi, Antonio Bianchi, Kirat Dhilung Hang, Jacopo Corbetta
Publikováno v:
ACSAC
To protect Android users, researchers have been analyzing unknown, potentially-malicious applications by using systems based on emulators, such as the Google's Bouncer and Andrubis. Emulators are the go-to choice because of their convenience: they ca
Autor:
Giovanni Vigna, Kirat Dhilung Hang
Publikováno v:
ACM Conference on Computer and Communications Security
Automated dynamic malware analysis is a common approach for detecting malicious software. However, many malware samples identify the presence of the analysis environment and evade detection by not performing any malicious activity. Recently, an appro
Publikováno v:
ACSAC
In this work, we propose SigMal, a fast and precise malware detection framework based on signal processing techniques. SigMal is designed to operate with systems that process large amounts of binary samples. It has been observed that many samples rec
Autor:
Xin Hu, Marc Ph. Stoecklin, Kirat Dhilung Hang, Jiyong Jang, Ting Wang, B. Wuest, Douglas Lee Schales
Publikováno v:
IBM Journal of Research and Development. 60:3:1-3:14
The Domain Name System (DNS) protocol is one of the few application protocols that are allowed to cross network perimeters of organizations. However, comprehensive monitoring of DNS traffic has been often overlooked in many organizations' cybersecuri
Publikováno v:
IBM Journal of Research and Development. 60:6:1-6:11
Recent years have witnessed the very rapid increase in both the volume and sophistication of malware programs. Malware authors invest heavily in technologies and capabilities to streamline the process of building and mutating existing malware program