2014 7th International Symposium on Resilient Control Systems (ISRCS) 2014
DOI: 10.1109/isrcs.2014.6900103
|View full text |Cite
|
Sign up to set email alerts
|

VirusBattle: State-of-the-art malware analysis for better cyber threat intelligence

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
12
0
1

Year Published

2016
2016
2022
2022

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 20 publications
(13 citation statements)
references
References 7 publications
0
12
0
1
Order By: Relevance
“…Evaluating the top results shown in Tables 2 and 3, we can see that ontologies and related semantics-based methods are among the more highly scored solutions [7,11,102,113,120].…”
Section: Formalization and Ontology Buildingmentioning
confidence: 99%
See 1 more Smart Citation
“…Evaluating the top results shown in Tables 2 and 3, we can see that ontologies and related semantics-based methods are among the more highly scored solutions [7,11,102,113,120].…”
Section: Formalization and Ontology Buildingmentioning
confidence: 99%
“…Attacks against the hypervisor itself [115] and cross-VM attacks [9,125] Execution path analysis explores or defines code paths that are dynamically investigated during execution. Miles et al [102] focus on the interrelationship among malware instances to discover new connections between actors, machines, and malware: Code, semantically similar procedures of code, and API call execution/event log traces are compared to identify similarities. This includes websites, e-mail messages and PE file headers.…”
Section: Malware Analysis Solutionsmentioning
confidence: 99%
“…This may be attained by encouraging the revelation from claiming concealed inter-relationships the middle of cyber-artifacts, for example, components starting with organized organize logs, proxy Furthermore IDS systems, VPN, anti-virus, DLP, DNS queries. In addition, more provision logs are from relevant data such as like email, print logs, office get logs and inside talk logs, which are mankind's assets information [20], [21]. Malware analysis process has been presents by As shown in Figure 1 that presents the overall process flow of the malware analysis performed on malware sample.…”
Section: Malware In Cyber Threat Intelligencementioning
confidence: 99%
“…To instance, programmed association finding in digital artifacts pulled from a corporate system under constant strike enabled security examiners should fast find at influenced machines. Furthermore to identify those foundation utilized by their attackers [20], [23], [24].…”
Section: Malware In Cyber Threat Intelligencementioning
confidence: 99%
See 1 more Smart Citation