PPT-Malware-Aware Processors: A Framework for Efficient Online Malware Detection

Author : tatyana-admore | Published Date : 2018-03-22

Meltem Ozsoy Caleb Donovick Iakov Gorelik Nael Abu Ghazaleh and Dmitry Ponomarev Binghamton University University of California Riverside HPCA 2015

Presentation Embed Code

Download Presentation

Download Presentation The PPT/PDF document "Malware-Aware Processors: A Framework fo..." is the property of its rightful owner. Permission is granted to download and print the materials on this website for personal, non-commercial use only, and to display it on your personal computer provided you do not modify the materials and that you retain all copyright notices contained in the materials. By downloading content from our website, you accept the terms of this agreement.

Malware-Aware Processors: A Framework for Efficient Online Malware Detection: Transcript


Meltem Ozsoy Caleb Donovick Iakov Gorelik Nael Abu Ghazaleh and Dmitry Ponomarev Binghamton University University of California Riverside HPCA 2015 San Francisco CA. Jason . Ganzhorn. 5-12-2010. 1. Background. A large number of transactions take place over the Internet. Shopping. Communication. Browse News. It’s likely that you perform some of these transactions as well.. Android Malware Classification . Using Weighted . Contextual API Dependency . Graphs. Mu Zhang. Yue. . Duan. Heng. Yin. Zhiruo. Zhao. Department . of Electrical Engineering and . Computer Science. MSc Information Security . Project 2013/2014. Author: Nicholas . Aquilina. Supervisor: . Dr. Konstantinos . Markantonakis. Aims and . Objectives of Project. Understand and . analyse. . current malware strategies. Author : . Yajin. Zhou, . Xuxuan. Jiang. TJ. Index of this paper. Introduction. Malware Timeline. Malware Characterization. Malware Installation. Repackaging. Update Attack. Drive-by Download. Others. MARS.MTC.SRI.COM. Motivation. Malware landscape is diverse and constant evolving. Large botnets. Diverse propagation vectors, exploits, C&C. Capabilities – backdoor, keylogging, rootkits,. Logic bombs, time-bombs. Connor Schnaith, Taiyo Sogawa. 9 April 2012. Motivation. “. 5. 000 . new. malware samples per day”. --David Perry of Trend Micro. Large variance between attacks. Polymorphic attacks . Perform the same function. Our Focus. Victim. Attacker. Malicious. Web. Exploit. browser. Phishing. Exploit. vulnerability. Code Repo. Database. Malware . propagation. Initial Compromise. Gaining Foothold. Lateral Movement. High Value Asset Acquisition. Suman Jana and Vitaly Shmatikov. The University of Texas at Austin. All about sophisticated detection and evasion techniques. Polymorphism, metamorphism, obfuscation… . Modern malware research. All about sophisticated detection and evasion techniques. . malware. . detection. . mechanisms. in online banking. Jakub Kałużny. Mateusz Olejarka. CONFidence. , 25.05.2015. Pentesters. @ SecuRing. Ex-. developers. Experience. with:. E-banking and mobile banking . Nael Abu-Ghazaleh. Joint work with Khaled . Khasawneh. , Dmitry . Ponomarev. and Lei Yu. Malware is Everywhere!. Malware is Everywhere!. Over 250,000 malware registered every day! . Hardware Malware Detectors (HMDs). Grace. M, Zhou. Y, . Shilong. . Z, Jiang. . X. RiskRanker. analyses the paths within an android application. Potentially malicious security risks are flagged for investigation. Summary. This application showcases how reverse engineering. Analysts. “Decrease exposure time from . d. etection to . e. radication”. Garrett Schubert – EMC Corporation. Critical Incident Response Center. Incident Response\Content Lead. Surgery on the front lines. Malware. Vitor M. . Afonso, . Dario S. Fernandes . Filho, . André . R. A. . Grégio1. , PauloL.de Geus, . Mario . Jino. Contents. Introduction. Related work. System Description. Tests. Results. Conclusion And Future Work. Online Ba n king Channels T he t h r e a t – DYRE and GOZI Trojan malware :  While neither threat is new, s ecurity analysts have detected a recent rise in fraud attempts using two variants of

Download Document

Here is the link to download the presentation.
"Malware-Aware Processors: A Framework for Efficient Online Malware Detection"The content belongs to its owner. You may download and print it for personal use, without modification, and keep all copyright notices. By downloading, you agree to these terms.

Related Documents