Poster: Automatic profiling of evasive mixed-mode malware with SEMU. Aboughadareh, S., Csallner, C., & Azarmi, M. In 33rd IEEE Symposium on Security and Privacy (Oakland), Poster session, May, 2013. bibtex @inproceedings{aboughadareh13poster,
author = {Shabnam Aboughadareh and Christoph Csallner and Mehdi Azarmi},
title = {Poster: Automatic profiling of evasive mixed-mode malware with {SEMU}},
booktitle = {33rd IEEE Symposium on Security and Privacy (Oakland), Poster session},
year = 2013,
month = may,
category = {Security},
summary = {We describe a combination of user- and kernel-mode malware
that can subvert state-of-the-art dynamic malware analysis techniques,
such as those built on the popular TEMU and Ether analysis frameworks.
We present an alternative malware analysis framework, SEMU, which cannot
be subverted by such attacks as it performs whole-system analysis
outside the analyzed (guest) OS.},
}
Downloads: 0
{"_id":"dn4ci5shEFJZhmAPW","bibbaseid":"aboughadareh-csallner-azarmi-posterautomaticprofilingofevasivemixedmodemalwarewithsemu-2013","downloads":0,"creationDate":"2017-05-18T00:10:12.855Z","title":"Poster: Automatic profiling of evasive mixed-mode malware with SEMU","author_short":["Aboughadareh, S.","Csallner, C.","Azarmi, M."],"year":2013,"bibtype":"inproceedings","biburl":"http://ranger.uta.edu/~csallner/papers/csallner.bib","bibdata":{"bibtype":"inproceedings","type":"inproceedings","author":[{"firstnames":["Shabnam"],"propositions":[],"lastnames":["Aboughadareh"],"suffixes":[]},{"firstnames":["Christoph"],"propositions":[],"lastnames":["Csallner"],"suffixes":[]},{"firstnames":["Mehdi"],"propositions":[],"lastnames":["Azarmi"],"suffixes":[]}],"title":"Poster: Automatic profiling of evasive mixed-mode malware with SEMU","booktitle":"33rd IEEE Symposium on Security and Privacy (Oakland), Poster session","year":"2013","month":"May","category":"Security","summary":"We describe a combination of user- and kernel-mode malware that can subvert state-of-the-art dynamic malware analysis techniques, such as those built on the popular TEMU and Ether analysis frameworks. We present an alternative malware analysis framework, SEMU, which cannot be subverted by such attacks as it performs whole-system analysis outside the analyzed (guest) OS.","bibtex":"@inproceedings{aboughadareh13poster,\r\n author = {Shabnam Aboughadareh and Christoph Csallner and Mehdi Azarmi},\r\n title = {Poster: Automatic profiling of evasive mixed-mode malware with {SEMU}},\r\n booktitle = {33rd IEEE Symposium on Security and Privacy (Oakland), Poster session},\r\n year = 2013,\r\n month = may,\r\n category = {Security},\r\n\tsummary = {We describe a combination of user- and kernel-mode malware \r\n\t\tthat can subvert state-of-the-art dynamic malware analysis techniques,\r\n\t\tsuch as those built on the popular TEMU and Ether analysis frameworks.\r\n\t\tWe present an alternative malware analysis framework, SEMU, which cannot\r\n\t\tbe subverted by such attacks as it performs whole-system analysis\r\n\t\toutside the analyzed (guest) OS.},\r\n}\r\n\r\n","author_short":["Aboughadareh, S.","Csallner, C.","Azarmi, M."],"key":"aboughadareh13poster","id":"aboughadareh13poster","bibbaseid":"aboughadareh-csallner-azarmi-posterautomaticprofilingofevasivemixedmodemalwarewithsemu-2013","role":"author","urls":{},"downloads":0},"search_terms":["poster","automatic","profiling","evasive","mixed","mode","malware","semu","aboughadareh","csallner","azarmi"],"keywords":[],"authorIDs":["591ce66416f317c873000007"],"dataSources":["bS8bwjSktjpmMpkn5"]}