語系:
繁體中文
English
說明(常見問題)
回圖書館首頁
手機版館藏查詢
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
FindBook
Google Book
Amazon
博客來
WiLDCAT : = An integrated stealth environment for dynamic malware analysis.
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
WiLDCAT :/
其他題名:
An integrated stealth environment for dynamic malware analysis.
作者:
Vasudevan, Amit.
面頁冊數:
1 online resource (177 pages)
附註:
Source: Dissertations Abstracts International, Volume: 69-01, Section: B.
Contained By:
Dissertations Abstracts International69-01B.
標題:
Computer science. -
電子資源:
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=3258607click for full text (PQDT)
ISBN:
9781109964486
WiLDCAT : = An integrated stealth environment for dynamic malware analysis.
Vasudevan, Amit.
WiLDCAT :
An integrated stealth environment for dynamic malware analysis. - 1 online resource (177 pages)
Source: Dissertations Abstracts International, Volume: 69-01, Section: B.
Thesis (Ph.D.)--The University of Texas at Arlington, 2007.
Includes bibliographical references
Malware a term that refers to viruses, trojans, worms, spyware or any form of malicious code is widespread today. Given the devastating effects that malware have on the computing world, detecting and countering malware is an important goal. Malware analysis is a challenging and multi-step process providing insight into malware structure and functionality, facilitating the development of an antidote. To successfully detect and counter malware, malware analysts must be able to analyze them in binary, in both a coarse- (behavioral) and fine-grained (structural) fashion. However, current research in coarse- and fine-grained code analysis (categorized into static and dynamic) have severe shortcomings in the context of malware. Static approaches have been tailored towards malware and allow exhaustive fine-grained malicious code analysis, but lack support for self-modifying code, have limitations related to code-obfuscations and face the undecidability problem. Given that most if not all recent malware employ self-modifying code and code-obfuscations, poses the need to analyze them at runtime using dynamic approaches. Current dynamic approaches for coarse- and fine-grained code analysis are not tailored specifically towards malware and lack support for multithreading, self-modifying/self-checking (SM-SC) code and are easily detected and countered by ever-evolving anti-analysis tricks employed by malware. To address this problem, we propose WiLDCAT, an integrated dynamic malware analysis environment that facilitates the analysis and combat of malware, that are ever-evolving, becoming evasive and increasingly hard to analyze. WiLDCAT cannot be detected or countered in any fashion and incorporates novel, patent pending strategies for both dynamic coarse- and fine-grained binary code analysis, while remaining completely stealth. The environment allows comprehensive analysis of malware code-streams while selectively isolating them from other code-streams in real-time. WiLDCAT is portable, efficient and easy-to-use supporting multithreading, SM-SC code and any form of code obfuscations in both user and kernel-mode on commodity operating systems. It advances the state of the art in research pertaining to malware analysis by providing the toolkit that was sorely missing in the arsenal of malware analysts, until now!
Electronic reproduction.
Ann Arbor, Mich. :
ProQuest,
2023
Mode of access: World Wide Web
ISBN: 9781109964486Subjects--Topical Terms:
523869
Computer science.
Subjects--Index Terms:
Computer securityIndex Terms--Genre/Form:
542853
Electronic books.
WiLDCAT : = An integrated stealth environment for dynamic malware analysis.
LDR
:03667nmm a2200361K 4500
001
2358967
005
20230830051533.5
006
m o d
007
cr mn ---uuuuu
008
241011s2007 xx obm 000 0 eng d
020
$a
9781109964486
035
$a
(MiAaPQ)AAI3258607
035
$a
(MiAaPQ)uta:1689
035
$a
AAI3258607
040
$a
MiAaPQ
$b
eng
$c
MiAaPQ
$d
NTU
100
1
$a
Vasudevan, Amit.
$3
2054585
245
1 0
$a
WiLDCAT :
$b
An integrated stealth environment for dynamic malware analysis.
264
0
$c
2007
300
$a
1 online resource (177 pages)
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
500
$a
Source: Dissertations Abstracts International, Volume: 69-01, Section: B.
500
$a
Publisher info.: Dissertation/Thesis.
500
$a
Advisor: Yerraballi, Ramesh.
502
$a
Thesis (Ph.D.)--The University of Texas at Arlington, 2007.
504
$a
Includes bibliographical references
520
$a
Malware a term that refers to viruses, trojans, worms, spyware or any form of malicious code is widespread today. Given the devastating effects that malware have on the computing world, detecting and countering malware is an important goal. Malware analysis is a challenging and multi-step process providing insight into malware structure and functionality, facilitating the development of an antidote. To successfully detect and counter malware, malware analysts must be able to analyze them in binary, in both a coarse- (behavioral) and fine-grained (structural) fashion. However, current research in coarse- and fine-grained code analysis (categorized into static and dynamic) have severe shortcomings in the context of malware. Static approaches have been tailored towards malware and allow exhaustive fine-grained malicious code analysis, but lack support for self-modifying code, have limitations related to code-obfuscations and face the undecidability problem. Given that most if not all recent malware employ self-modifying code and code-obfuscations, poses the need to analyze them at runtime using dynamic approaches. Current dynamic approaches for coarse- and fine-grained code analysis are not tailored specifically towards malware and lack support for multithreading, self-modifying/self-checking (SM-SC) code and are easily detected and countered by ever-evolving anti-analysis tricks employed by malware. To address this problem, we propose WiLDCAT, an integrated dynamic malware analysis environment that facilitates the analysis and combat of malware, that are ever-evolving, becoming evasive and increasingly hard to analyze. WiLDCAT cannot be detected or countered in any fashion and incorporates novel, patent pending strategies for both dynamic coarse- and fine-grained binary code analysis, while remaining completely stealth. The environment allows comprehensive analysis of malware code-streams while selectively isolating them from other code-streams in real-time. WiLDCAT is portable, efficient and easy-to-use supporting multithreading, SM-SC code and any form of code obfuscations in both user and kernel-mode on commodity operating systems. It advances the state of the art in research pertaining to malware analysis by providing the toolkit that was sorely missing in the arsenal of malware analysts, until now!
533
$a
Electronic reproduction.
$b
Ann Arbor, Mich. :
$c
ProQuest,
$d
2023
538
$a
Mode of access: World Wide Web
650
4
$a
Computer science.
$3
523869
653
$a
Computer security
653
$a
Malware
655
7
$a
Electronic books.
$2
lcsh
$3
542853
690
$a
0984
710
2
$a
ProQuest Information and Learning Co.
$3
783688
710
2
$a
The University of Texas at Arlington.
$3
1025869
773
0
$t
Dissertations Abstracts International
$g
69-01B.
856
4 0
$u
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=3258607
$z
click for full text (PQDT)
筆 0 讀者評論
館藏地:
全部
電子資源
出版年:
卷號:
館藏
1 筆 • 頁數 1 •
1
條碼號
典藏地名稱
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
W9481323
電子資源
11.線上閱覽_V
電子書
EB
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
評論
新增評論
分享你的心得
Export
取書館
處理中
...
變更密碼
登入