Toward Automated Dynamic Malware Analysis Using CWSandbox

@article{Willems2007TowardAD,
  title={Toward Automated Dynamic Malware Analysis Using CWSandbox},
  author={Carsten Willems and Thorsten Holz and Felix C. Freiling},
  journal={IEEE Security & Privacy},
  year={2007},
  volume={5}
}
Malware is notoriously difficult to combat because it appears and spreads so quickly. In this article, we describe the design and implementation of CWSandbox, a malware analysis tool that fulfills our three design criteria of automation, effectiveness, and correctness for the Win32 family of operating systems 
Highly Influential
This paper has highly influenced 29 other papers. REVIEW HIGHLY INFLUENTIAL CITATIONS
Highly Cited
This paper has 547 citations. REVIEW CITATIONS

From This Paper

Figures, tables, and topics from this paper.

Citations

Publications citing this paper.
Showing 1-10 of 359 extracted citations

A dynamic malware analyzer against virtual machine aware malicious software

Security and Communication Networks • 2014
View 4 Excerpts
Highly Influenced

Detecting Malicious Javascript in PDF through Document Instrumentation

2014 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks • 2014
View 8 Excerpts
Highly Influenced

A Lightweight Design of Malware Behavior Representation

2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications • 2013
View 12 Excerpts
Highly Influenced

Behavior-based Malware analysis using profile hidden Markov models

2013 International Conference on Security and Cryptography (SECRYPT) • 2013
View 7 Excerpts
Highly Influenced

Clustering of Similar Malware Behavior via Structural Host-Sequence Comparison

2013 IEEE 37th Annual Computer Software and Applications Conference • 2013
View 6 Excerpts
Highly Influenced

548 Citations

0204060'09'12'15'18
Citations per Year
Semantic Scholar estimates that this publication has 548 citations based on the available data.

See our FAQ for additional information.

References

Publications referenced by this paper.
Showing 1-2 of 2 references

Hooking Windows API—Technics of Hooking API Functions on Windows,

Holy Father
CodeBreakers J., • 2004
View 1 Excerpt

API Hooking Revealed,

I. Ivanov
The Code Project, • 2002
View 1 Excerpt

Similar Papers

Loading similar papers…