2021
DOI: 10.48550/arxiv.2101.07328
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

MIMOSA: Reducing Malware Analysis Overhead with Coverings

Mohsen Ahmadi,
Kevin Leach,
Ryan Dougherty
et al.

Abstract: There is a growing body of malware samples that evade automated analysis and detection tools. Malware may measure fingerprints ("artifacts") of the underlying analysis tool or environment, and change their behavior when artifacts are detected. While analysis tools can mitigate artifacts to reduce exposure, such concealment is expensive. However, not every sample checks for every type of artifact-analysis efficiency can be improved by mitigating only those artifacts most likely to be used by a sample. Using tha… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
18
0

Year Published

2022
2022
2022
2022

Publication Types

Select...
8

Relationship

0
8

Authors

Journals

citations
Cited by 12 publications
(18 citation statements)
references
References 22 publications
0
18
0
Order By: Relevance
“…In [1] author use anonymous authentication to preserving location privacy using blind signature. In [2] author propose MIMOSA, a system that identifies a small set of "covering" tool configurations that collectively defeat most malware samples with increased efficiency In [3] study how bots can influence the opinion, finding which parameters are playing a role in shrinking or coalescing the communities, and finally logically proving the effectiveness of each of the hypotheses.In [4] conclude that the reassembleable disassembly rewriting yields better scalability in comparison to lifting to an intermediate representation and performing a full translation.In [5] approach injects countermeasures by reassembling the disassembly whereas the second approach leverages a full translation to a high-level IR and lowering that back to the target architecture Seny Kamara, Charalampos Papamanthou uses Searchable symmetric encryption (SSE) enables a client to outsource a collection of encrypted documents in the cloud and retain the ability to perform keyword searches without revealing information about the contents of the documents and queries. This is mainly because, currently, the only method for achieving sub-linear time search is the inverted index approach (Curtmola, Garay, Kamara and Ostrovsky, CCS '06) which requires the search algorithm to access a sequence of memory locations, each of which is unpredictable and stored at the previous location in the sequence.…”
Section: Literature Reviewmentioning
confidence: 77%
“…In [1] author use anonymous authentication to preserving location privacy using blind signature. In [2] author propose MIMOSA, a system that identifies a small set of "covering" tool configurations that collectively defeat most malware samples with increased efficiency In [3] study how bots can influence the opinion, finding which parameters are playing a role in shrinking or coalescing the communities, and finally logically proving the effectiveness of each of the hypotheses.In [4] conclude that the reassembleable disassembly rewriting yields better scalability in comparison to lifting to an intermediate representation and performing a full translation.In [5] approach injects countermeasures by reassembling the disassembly whereas the second approach leverages a full translation to a high-level IR and lowering that back to the target architecture Seny Kamara, Charalampos Papamanthou uses Searchable symmetric encryption (SSE) enables a client to outsource a collection of encrypted documents in the cloud and retain the ability to perform keyword searches without revealing information about the contents of the documents and queries. This is mainly because, currently, the only method for achieving sub-linear time search is the inverted index approach (Curtmola, Garay, Kamara and Ostrovsky, CCS '06) which requires the search algorithm to access a sequence of memory locations, each of which is unpredictable and stored at the previous location in the sequence.…”
Section: Literature Reviewmentioning
confidence: 77%
“…In [1] author use anonymous authentication to preserving location privacy using blind signature. In [2] author propose MIMOSA, a system that identifies a small set of "covering" tool configurations that collectively defeat most malware samples with increased efficiency In [3] study how bots can influence the opinion, finding which parameters are playing a role in shrinking or coalescing the communities, and finally logically proving the effectiveness of each of the hypotheses.In [4] conclude that the reassembleable disassembly rewriting yields better scalability in comparison to lifting to an intermediate representation and performing a full translation.In [5] approach injects countermeasures by reassembling the disassembly whereas the second approach leverages a full translation to a high-level IR and lowering that back to the target architecture.…”
Section: Literature Reviewmentioning
confidence: 99%
“…An XML document can be modeled as an ordered labeled tree [2]. There is considerable previous works on finding edit distances between trees [3][4][5][6][7][8][9][10][11]. Most algorithms in this category are direct descendants of the dynamic programming techniques for finding the edit distance between strings [12].…”
Section: Introductionmentioning
confidence: 99%