Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
article

Refereed paper: MCF: a malicious code filter

Published: 01 January 1995 Publication History

Abstract

The goal of this research is to develop a method to detect malicious code (e.g. computer viruses, worms, Trojan horses, and time/logic bombs) and security-related vulnerabilities in system programs. The Malicious Code Filter (MCF) is a programmable static analysis tool developed for this purpose. It allows the examination of a program before installation, thereby avoiding damage a malicious program might inflict. This paper summarizes our work over the last few years that led us to develop MCF.

References

[1]
Cohen, F., Computer viruses: theory and experiments. Computers & Security. v6. 22-35.
[2]
Schoch, J.F. and Hupp, J.A., The worm programs¿Early experience with a distributed computation. Commun. ACM. v25 i3. 172-180.
[3]
Computer Viruses: A High-tech Disease. 1988.
[4]
Lo, R.W., Static analysis of programs with application to malicious code detection. In: PhD dissertation, Dept. of Computer Science, University of California, Davis.
[5]
Cohen, F., A cryptographic checksum for integrity protection. Computers & Security. 505-510.
[6]
Crocker, S. and Pozzo, M.M., A proposal for a verification-based virus filter. In: Proc. IEEE Computer Soc. Symposium on Security and Privacy, pp. 319-324.
[7]
Crawford, R., Lo, R., Crossley, J., Fink, G., Kerchen, P., Ho, W., Levitt, K., Olsson, R. and Archer, M., A testbed for malicious code detection: A synthesis of static and dynamic analysis techniques. In: Proc. Dept. of Energy Computer Security Group Conf., 17. pp. 1-23.
[8]
Olsson, R.A., Crawford, R.H. and Wilson Ho, W., Dalek: a GNU, improved programmable debugger. In: USENIX Conf. Proc., pp. 221-231.
[9]
Hamlet, R., Testing programs to detect malicious faults. In: Proc. IFIP Working Conf. Dependable Computing, pp. 162-169.
[10]
Weiser, M., Program slicing. In: Proc. Fifth Int. Conf. Software Engineering, pp. 439-449.
[11]
Zislis, P.M., Semantic decomposition of computer programs: an aid to program testing. Acta Informatica. 245-269.
[12]
Soloman, A., Mechanisms of stealth. In: Int. Computer Virus and Security Conf., pp. 374-383.
[13]
Boyer, R.S., Elspas, B. and Levitt, K.N., SELECT¿A formal system for testing and debugging programs by symbolic execution. In: Proc. Int. Conf. Reliable Software, pp. 234-245.
[14]
Olsson, R.A., Crawford, R.H. and Wilson Ho, W., A data-flow approach to event-based debugging. Software¿Practice and Experience. v21 i2. 209-229.
[15]
Spafford, E.H., Common system vulnerabilities. In: Proc. Workshop on Future Directions in Computer Misuse and Anomaly Defection, University of California, Davis. pp. 31
[16]
Farmer, D., COPS and robbers: UN¿X system security. COPS. report in comp.sources.unix/volume21/cops.
[17]
Baldwin, R.W., Kuang: rule-based security checking. Kuang.man in comp.sources.unix/volume21/cops.

Cited By

View all
  • (2021)A Survey on Feature Extraction Methods of Heuristic Backdoor DetectionInternational Conference on Frontiers of Electronics, Information and Computation Technologies10.1145/3474198.3478137(1-7)Online publication date: 21-May-2021
  • (2021)Mining Trojan Detection Based on Multi-dimensional Static FeaturesScience of Cyber Security10.1007/978-3-030-89137-4_4(51-65)Online publication date: 13-Aug-2021
  • (2018)Multiple instance learning for malware classificationExpert Systems with Applications: An International Journal10.1016/j.eswa.2017.10.03693:C(346-357)Online publication date: 1-Mar-2018
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

Publisher

Elsevier Advanced Technology Publications

United Kingdom

Publication History

Published: 01 January 1995

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 03 Oct 2024

Other Metrics

Citations

Cited By

View all
  • (2021)A Survey on Feature Extraction Methods of Heuristic Backdoor DetectionInternational Conference on Frontiers of Electronics, Information and Computation Technologies10.1145/3474198.3478137(1-7)Online publication date: 21-May-2021
  • (2021)Mining Trojan Detection Based on Multi-dimensional Static FeaturesScience of Cyber Security10.1007/978-3-030-89137-4_4(51-65)Online publication date: 13-Aug-2021
  • (2018)Multiple instance learning for malware classificationExpert Systems with Applications: An International Journal10.1016/j.eswa.2017.10.03693:C(346-357)Online publication date: 1-Mar-2018
  • (2018)Probabilistic analysis of dynamic malware tracesComputers and Security10.1016/j.cose.2018.01.01274:C(221-239)Online publication date: 1-May-2018
  • (2013)Detecting machine-morphed malware variants via engine attributionJournal in Computer Virology10.1007/s11416-013-0183-69:3(137-157)Online publication date: 1-Aug-2013
  • (2011)Automatic analysis of malware behavior using machine learningJournal of Computer Security10.5555/2011216.201121719:4(639-668)Online publication date: 1-Dec-2011
  • (2011)Determining malicious executable distinguishing attributes and low-complexity detectionJournal in Computer Virology10.1007/s11416-010-0140-67:2(95-105)Online publication date: 1-May-2011
  • (2009)Fast virus detection by using high speed time delay neural networksProceedings of the 10th WSEAS international conference on Neural networks10.5555/1561799.1561829(169-183)Online publication date: 23-Mar-2009
  • (2009)Malware detection using statistical analysis of byte-level file contentProceedings of the ACM SIGKDD Workshop on CyberSecurity and Intelligence Informatics10.1145/1599272.1599278(23-31)Online publication date: 28-Jun-2009
  • (2008)Data mining methods for malware detection using instruction sequencesProceedings of the 26th IASTED International Conference on Artificial Intelligence and Applications10.5555/1712759.1712825(358-363)Online publication date: 6-Feb-2008
  • Show More Cited By

View Options

View options

Get Access

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media