2011
DOI: 10.1109/jcn.2011.6157418
|View full text |Cite
|
Sign up to set email alerts
|

SplitScreen: Enabling efficient, distributed malware detection

Abstract: We present the design and implementation of a novel anti-malware system called SplitScreen. SplitScreen performs an additional screening step prior to the signature matching phase found in existing approaches. The screening step filters out most non-infected files (90%) and also identifies malware signatures that are not of interest (99%). The screening step significantly improves end-to-end performance because safe files are quickly identified and are not processed further, and malware files can subsequently … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
69
1
1

Year Published

2013
2013
2022
2022

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 56 publications
(71 citation statements)
references
References 20 publications
0
69
1
1
Order By: Relevance
“…Cloud [4] Wireless Network [13] Access Control [14] [15,16,22,26]. Also, there is a solution designed for Android mobile devices [17].…”
Section: Purpose Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…Cloud [4] Wireless Network [13] Access Control [14] [15,16,22,26]. Also, there is a solution designed for Android mobile devices [17].…”
Section: Purpose Related Workmentioning
confidence: 99%
“…After analyzing the file, the server sends the result to the client, and then CloudAV determines whether to block the file or not on the basis of the result. Because CloudAV, however, sends the files to the server to examine, it may violate the privacy of users who handle sensitive data [15,16].…”
Section: Cloudavmentioning
confidence: 99%
See 1 more Smart Citation
“…Increasingly sophisticated antivirus software added to the growing amount and complexity of malware demands more processing power from personal computers, more specifically from the central processor unit (CPU) [7].…”
Section: Introductionmentioning
confidence: 99%
“…, ClamAV [19]를 확장하여 악 성코드를 탐지하는 방법 [10], 명령어 빈도수를 이용한 방법 [3], 함수의 길이를 이용한 방법 [6], 함수 호출 그래프를 이용한 방법 [8], 바이트 레벨 파일 컨텐츠 분석 방법 [7], API 조합을 이용한 윈도우 악성행위 분류 기법 [11] 참 고 문 헌…”
unclassified