2012
DOI: 10.1007/978-3-642-34638-5_7
|View full text |Cite
|
Sign up to set email alerts
|

Methodology for a Field Study of Anti-malware Software

Abstract: Abstract. Anti-malware products are typically evaluated using structured, automated tests to allow for comparison with other products and for measuring improved efficiency against specific attacks. We propose that anti-malware testing would benefit from field studies assessing effectiveness in more ecologically valid settings. This paper presents our methodology for conducting a 4-month field study with 50 participants, including discussion of deployment and data collection, encouraging retention of participan… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2013
2013
2024
2024

Publication Types

Select...
2
2

Relationship

1
3

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 10 publications
0
3
0
Order By: Relevance
“…The details of the methodology have been published elsewhere [14], but we nonetheless provide a brief summary here. The study monitored real-world computer usage through diagnostics and logging tools, monthly interviews and questionnaires, and in-depth investigation of any potential infections.…”
Section: Study Descriptionmentioning
confidence: 99%
See 2 more Smart Citations
“…The details of the methodology have been published elsewhere [14], but we nonetheless provide a brief summary here. The study monitored real-world computer usage through diagnostics and logging tools, monthly interviews and questionnaires, and in-depth investigation of any potential infections.…”
Section: Study Descriptionmentioning
confidence: 99%
“…Our experimental protocol [14,13] describes in detail the monthly procedure for identifying and classifying suspicious files that were not detected by the AV. This process of identification and classification is based on user reporting of suspicious machine behaviour, the analysis of logs from the monitoring tools, the results of automated queries to on-line sources with respect to processes found on the machine, file and start-up programme databases (obtained automatically by scripts that we wrote), and any other relevant piece of information that the technician conducting the review might deem relevant.…”
Section: Missed Detectionsmentioning
confidence: 99%
See 1 more Smart Citation