2010 International Conference on Availability, Reliability and Security 2010
DOI: 10.1109/ares.2010.105
|View full text |Cite
|
Sign up to set email alerts
|

Detection of Spyware by Mining Executable Files

Abstract: Abstract--Spyware represents a serious threat to confidentiality since it may result in loss of control over private data for computer users. This type of software might collect the data and send it to a third party without informed user consent. Traditionally two approaches have been presented for the purpose of spyware detection: Signature-based Detection and Heuristic-based Detection. These approaches perform well against known Spyware but have not been proven to be successful at detecting new spyware. This… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2011
2011
2022
2022

Publication Types

Select...
4
2
1

Relationship

2
5

Authors

Journals

citations
Cited by 29 publications
(7 citation statements)
references
References 22 publications
0
7
0
Order By: Relevance
“…This time, researchers applied Bagging and were successful in achieving 96 per cent accuracy [15]. In an attempt to detect spyware, n-grams of hexadecimal representation were used as features [16]. This attempt was successful in obtaining 90.5 per cent accuracy.…”
Section: Related Workmentioning
confidence: 99%
“…This time, researchers applied Bagging and were successful in achieving 96 per cent accuracy [15]. In an attempt to detect spyware, n-grams of hexadecimal representation were used as features [16]. This attempt was successful in obtaining 90.5 per cent accuracy.…”
Section: Related Workmentioning
confidence: 99%
“…MalPEFinder now provides a file attributes vector, including hash, name, and size of files, to complete the file matching; these file attributes can be extracted from PEFs conveniently and shorten the response time for malware attacks. Meanwhile, some malware file attributes found in the research can be quickly added to the vector structure to increase the detection rate of MalPEFinder.…”
Section: Discussionmentioning
confidence: 99%
“…Spyware can be defined as software that gathers information about a person or organisation without their consent or knowledge and sends it to another entity [28]. The software is designed for secrecy and durability.…”
Section: Context and Motivationmentioning
confidence: 99%
“…Spyware is usually organised in multiple modules, each performing one or more malicious activities, with the ability to use them according to the attacker's purpose [3]. Typical spyware modules include keystroke logging, screen logging, URL monitoring, turning on the microphone or camera, intercepting sensitive documents and exfiltrating them and collecting location information [28].…”
Section: Context and Motivationmentioning
confidence: 99%