2011
DOI: 10.1002/sec.390
|View full text |Cite
|
Sign up to set email alerts
|

MalPEFinder: fast and retrospective assessment of data breaches in malware attacks

Abstract: A successful data breach is often caused by malware installed by attackers. In a large-scale computer environment, it is difficult and costly for information technology managers to identify the victims and to assess the scope of the data breach when a malware attack occurs. Therefore, a quick and retrospective mechanism that can find victims is required. One such technology is Search. However, most search techniques are not designed for searching executable files; indeed, they become worse in identifying malwa… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2015
2015
2016
2016

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 9 publications
0
1
0
Order By: Relevance
“…Schaefer et al (2012) and Edmundson and Schaefer (2013) propose an approach for the retrieval of multimedia files from Huffman tables located in the header of JPEG files. Shabtai et al (2011) present eDare and Liu and Chen (2012) posit MalPEFinder to detect malware by searching for executable files. These schemes have in common three issues that restrict their use in the identification of files in cloud-based systems.…”
Section: Related Workmentioning
confidence: 99%
“…Schaefer et al (2012) and Edmundson and Schaefer (2013) propose an approach for the retrieval of multimedia files from Huffman tables located in the header of JPEG files. Shabtai et al (2011) present eDare and Liu and Chen (2012) posit MalPEFinder to detect malware by searching for executable files. These schemes have in common three issues that restrict their use in the identification of files in cloud-based systems.…”
Section: Related Workmentioning
confidence: 99%