Advances in Information and Computer Security
DOI: 10.1007/978-3-540-75651-4_2
|View full text |Cite
|
Sign up to set email alerts
|

Design Issues of an Isolated Sandbox Used to Analyze Malwares

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
16
0
2

Publication Types

Select...
4
4
1

Relationship

1
8

Authors

Journals

citations
Cited by 19 publications
(18 citation statements)
references
References 4 publications
0
16
0
2
Order By: Relevance
“…Virtualization-based [43][44][45][46][47][48] An environment to analyze malicious behavior in a separated space from actual system is required…”
Section: Motivation and Ourmentioning
confidence: 99%
“…Virtualization-based [43][44][45][46][47][48] An environment to analyze malicious behavior in a separated space from actual system is required…”
Section: Motivation and Ourmentioning
confidence: 99%
“…The MARS, Malware/Minimal-attack Analysis Result Set [26], is a set of dynamic and static analysis data for the malware samples of the CCC DATAset 2008, 2009, and 2010. One part of the metadata contains the hash digest, file name, file size, file type, detection name, and time stamp of the anti-virus software, as well as the version of the antivirus software with regard to a particular malware sample.…”
Section: Mars For Mwsmentioning
confidence: 99%
“…The method in [8], [9] provides the mimetic Internet environment in a totally isolated sandbox similar to our method. However, these sandboxes do not provide an effective way to observe the vulnerability exploitation while our sandbox effectively redirects attacks to a honeypot with multiple emulated vulnerabilities for efficiently observe the exploitation.…”
Section: Related Workmentioning
confidence: 99%