Skip to main content
Top
Published in:
Cover of the book

2013 | OriginalPaper | Chapter

Draft of a Dynamic Malware Detection System on Trustworthy Endpoints

Authors : Andreas Speier, Christofer Fein, David Bothe, Eric Reich, Norbert Pohlmann

Published in: ISSE 2013 Securing Electronic Business Processes

Publisher: Springer Fachmedien Wiesbaden

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Malware infected computer systems can be found with increasing evidence in private and commercial fields of use. Always exposed to the risk of a “Lying End-Point”, an already manipulated security application that pretends to run on a clean computer system, the demand for new security solutions continues to rise. Project iTES (“innovative Trustworthy Endpoint Security”), government-funded by the German Federal Ministry of Education and Research, introduces a new system to enhance security while preserving usability. Based on an existing virtualized system which diversifies the software to a specific form of use, the project aims to develop new sensors to monitor the system dynamically and deliver real-time responses.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
[ALRL04]
go back to reference Avizienis, Algirdas and Laprie, Jean-Claude. and Randell, Brian and Landwehr, Carl: Basic Concepts and Taxonomy of Dependable and Secure. In IEEE Transactions on Dependable and Secure Computing Vol. 1, No. 1. 2004, S. 11-33. Avizienis, Algirdas and Laprie, Jean-Claude. and Randell, Brian and Landwehr, Carl: Basic Concepts and Taxonomy of Dependable and Secure. In IEEE Transactions on Dependable and Secure Computing Vol. 1, No. 1. 2004, S. 11-33.
[ESKK08]
go back to reference Egele, Manuel and Scholte, Theodoor and Kirda, Engin and Kruegel, Christopher: A survey on automated dynamic malware-analysis techniques and tools. In: ACM Computing Surveys, vol. 44. s.l.: ACM New York, 2008. Egele, Manuel and Scholte, Theodoor and Kirda, Engin and Kruegel, Christopher: A survey on automated dynamic malware-analysis techniques and tools. In: ACM Computing Surveys, vol. 44. s.l.: ACM New York, 2008.
[GaRo03]
go back to reference Garfinkel, Tal and Rosenblum, Mendel. A virtual machine introspection based architecture for intrusion detection. In: Proc. Network and Distributet Systems Security Symposium. 2003. Garfinkel, Tal and Rosenblum, Mendel. A virtual machine introspection based architecture for intrusion detection. In: Proc. Network and Distributet Systems Security Symposium. 2003.
[Micr10]
go back to reference Microsoft. Intel TXT Homepage. [Online] 29. 04 2010. Microsoft. Intel TXT Homepage. [Online] 29. 04 2010.
[MSMP10]
go back to reference Microsoft. Microsoft Malware Protection Center - Encyclopedia TrojanDownloader:Win32/ Perka.A. [Online] 29. 04 2010. Microsoft. Microsoft Malware Protection Center - Encyclopedia TrojanDownloader:Win32/ Perka.A. [Online] 29. 04 2010.
[Pohl08]
go back to reference Pohlmann, Norbert. Trusted computing. Ein Weg zu neuen IT-Sicherheitsarchitekturen. s.l.: Vieweg, 2008. Pohlmann, Norbert. Trusted computing. Ein Weg zu neuen IT-Sicherheitsarchitekturen. s.l.: Vieweg, 2008.
[SSDD07]
go back to reference Sahita, Ravi and Savagaonkar, Uday R. and Dewan, Prashant and Durham, David: Mitigating the Lying-Endpoint Problem in Virtualized Network Access Frameworks. In: Managing Virtu- alization of Networks and Services. Berlin, Heidelberg: Springer, 2007, S. 135-146. Sahita, Ravi and Savagaonkar, Uday R. and Dewan, Prashant and Durham, David: Mitigating the Lying-Endpoint Problem in Virtualized Network Access Frameworks. In: Managing Virtu- alization of Networks and Services. Berlin, Heidelberg: Springer, 2007, S. 135-146.
[Stai12]
go back to reference Statista.com. Statista Messenger Statistics. [Online] 10. 10. 2012. Statista.com. Statista Messenger Statistics. [Online] 10. 10. 2012.
[StOw12]
go back to reference StatOwl.com. StatOwl Browser Statistics. [Online] 12. 10 2012. StatOwl.com. StatOwl Browser Statistics. [Online] 12. 10 2012.
[Webm12]
go back to reference WebmasterPro.com. WebmasterPro Office Suits Statistics. [Online] 10. 10. 2012. WebmasterPro.com. WebmasterPro Office Suits Statistics. [Online] 10. 10. 2012.
Metadata
Title
Draft of a Dynamic Malware Detection System on Trustworthy Endpoints
Authors
Andreas Speier
Christofer Fein
David Bothe
Eric Reich
Norbert Pohlmann
Copyright Year
2013
Publisher
Springer Fachmedien Wiesbaden
DOI
https://doi.org/10.1007/978-3-658-03371-2_1

Premium Partner