Secure in-VM monitoring using hardware virtualization
- Monirul I. Sharif, Wenke Lee, Weidong Cui, A. Lanzi
- Computer ScienceConference on Computer and Communications…
- 9 November 2009
This paper presents Secure In-VM Monitoring (SIM), a general-purpose framework that enables security monitoring applications to be placed back in the untrusted guest VM for efficiency without sacrificing the security guarantees provided by running them outside of the VM.
Automatic Reverse Engineering of Malware Emulators
- Monirul I. Sharif, A. Lanzi, Jonathon T. Giffin, Wenke Lee
- Computer ScienceIEEE Symposium on Security and Privacy
- 17 May 2009
The first work in automatic reverse engineering of malware emulators is presented, which accurately reveals the syntax and semantics of emulated instruction sets and reconstructs execution paths of original programs from their bytecode representations.
G-Free: defeating return-oriented programming through gadget-less binaries
- Kaan Onarlioglu, Leyla Bilge, A. Lanzi, D. Balzarotti, E. Kirda
- Computer ScienceAsia-Pacific Computer Systems Architecture…
- 6 December 2010
G-Free is presented, a compiler-based approach that represents the first practical solution against any possible form of ROP, and is able to eliminate all unaligned free-branch instructions inside a binary executable, and to protect the aligned free-Branch instructions to prevent them from being misused by an attacker.
A quantitative study of accuracy in system call-based malware detection
- Davide Canali, A. Lanzi, D. Balzarotti, Christopher Krügel, Mihai Christodorescu, E. Kirda
- Computer ScienceInternational Symposium on Software Testing and…
- 15 July 2012
This paper presents a systematic approach to measure how the choice of behavioral models influences the quality of a malware detector, and suggests that accuracy is non-linear across the model space, and that analytical reasoning is insufficient for finding an optimal model, and has to be supplemented by testing and empirical measurements.
PeerRush: Mining for unwanted P2P traffic
- Babak Rahbarinia, R. Perdisci, A. Lanzi, Kang Li
- Computer ScienceJournal of Information Security and Applications
- 18 July 2013
Classification of packed executables for accurate computer virus detection
- R. Perdisci, A. Lanzi, Wenke Lee
- Computer SciencePattern Recognition Letters
- 30 October 2008
AccessMiner: using system-centric models for malware protection
- A. Lanzi, D. Balzarotti, Christopher Krügel, Mihai Christodorescu, E. Kirda
- Computer ScienceConference on Computer and Communications…
- 4 October 2010
The system-centric approach models the way in which benign programs access OS resources (such as files and registry entries) and raises very few (even zero) false positives while being able to detect a significant fraction of today's malware.
McBoost: Boosting Scalability in Malware Collection and Analysis Using Statistical Classification of Executables
- R. Perdisci, A. Lanzi, Wenke Lee
- Computer ScienceAsia-Pacific Computer Systems Architecture…
- 8 December 2008
A fast statistical malware detection tool that is intended to improve the scalability of existing malware collection and analysis approaches, McBoost reduces the overall time of analysis by classifying and filtering out the least suspicious binaries and passing only the most suspicious ones to a detailed binary analysis process for signature extraction.
Diversified Process Replicæ for Defeating Memory Error Exploits
- D. Bruschi, L. Cavallaro, A. Lanzi
- Computer ScienceIEEE International Performance, Computing, and…
- 11 April 2007
This work defines pr as the replica of a process p which behaves identically to p but has some "structural" diversity from it, thus defeating absolute and partial overwriting memory error exploits and making possible to detect memory corruption attacks in a deterministic way.
Impeding Malware Analysis Using Conditional Code Obfuscation
- Monirul I. Sharif, A. Lanzi, Jonathon T. Giffin, Wenke Lee
- Computer ScienceNetwork and Distributed System Security Symposium
- 1 February 2008
This work has implemented a compiler-level tool that takes a malware source program and automatically generates an obfuscated binary and provides insight into the strengths, weaknesses, and possible ways to strengthen current analysis approaches in order to defeat this malware obfuscation technique.
...
...