About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
Digital Forensics and Cyber Crime. 9th International Conference, ICDF2C 2017, Prague, Czech Republic, October 9-11, 2017, Proceedings

Research Article

FindEvasion: An Effective Environment-Sensitive Malware Detection System for the Cloud

Download(Requires a free EAI acccount)
477 downloads
Cite
BibTeX Plain Text
  • @INPROCEEDINGS{10.1007/978-3-319-73697-6_1,
        author={Xiaoqi Jia and Guangzhe Zhou and Qingjia Huang and Weijuan Zhang and Donghai Tian},
        title={FindEvasion: An Effective Environment-Sensitive Malware Detection System for the Cloud},
        proceedings={Digital Forensics and Cyber Crime. 9th International Conference, ICDF2C 2017, Prague, Czech Republic, October 9-11, 2017, Proceedings},
        proceedings_a={ICDF2C},
        year={2018},
        month={1},
        keywords={Cloud security Environment-sensitive malware MBSS Transparent extraction Multiple operating environments},
        doi={10.1007/978-3-319-73697-6_1}
    }
    
  • Xiaoqi Jia
    Guangzhe Zhou
    Qingjia Huang
    Weijuan Zhang
    Donghai Tian
    Year: 2018
    FindEvasion: An Effective Environment-Sensitive Malware Detection System for the Cloud
    ICDF2C
    Springer
    DOI: 10.1007/978-3-319-73697-6_1
Xiaoqi Jia,*, Guangzhe Zhou,*, Qingjia Huang,*, Weijuan Zhang,*, Donghai Tian1
  • 1: Beijing Institute of Technology
*Contact email: jiaxiaoqi@iie.ac.cn, zhouguangzhe@iie.ac.cn, huangqingjia@iie.ac.cn, zhangweijuan@iie.ac.cn

Abstract

In recent years, environment-sensitive malwares are growing rapidly and they pose significant threat to cloud platforms. They may maliciously occupy the computing resources and steal the tenants’ private data. The environment-sensitive malware can identify the operating environment and perform corresponding malicious behaviors in different environments. This greatly increased the difficulty of detection. At present, the research on automatic detection of environment-sensitive malwares is still rare, but it has attracted more and more attention.

Keywords
Cloud security Environment-sensitive malware MBSS Transparent extraction Multiple operating environments
Published
2018-01-23
Appears in
SpringerLink
http://dx.doi.org/10.1007/978-3-319-73697-6_1
Copyright © 2017–2025 EAI
EBSCOProQuestDBLPDOAJPortico
EAI Logo

About EAI

  • Who We Are
  • Leadership
  • Research Areas
  • Partners
  • Media Center

Community

  • Membership
  • Conference
  • Recognition
  • Sponsor Us

Publish with EAI

  • Publishing
  • Journals
  • Proceedings
  • Books
  • EUDL