Using Verification Technology to Specify and Detect Malware. / Holzer, Andreas; Kinder, Johannes; Veith, Helmut.

11th Int. Conf. Computer Aided Systems Theory (Eurocast 2007), Revised Selected Papers. Springer, 2007. p. 497-504.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Published

Standard

Using Verification Technology to Specify and Detect Malware. / Holzer, Andreas; Kinder, Johannes; Veith, Helmut.

11th Int. Conf. Computer Aided Systems Theory (Eurocast 2007), Revised Selected Papers. Springer, 2007. p. 497-504.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Harvard

Holzer, A, Kinder, J & Veith, H 2007, Using Verification Technology to Specify and Detect Malware. in 11th Int. Conf. Computer Aided Systems Theory (Eurocast 2007), Revised Selected Papers. Springer, pp. 497-504. https://doi.org/10.1007/978-3-540-75867-9_63

APA

Holzer, A., Kinder, J., & Veith, H. (2007). Using Verification Technology to Specify and Detect Malware. In 11th Int. Conf. Computer Aided Systems Theory (Eurocast 2007), Revised Selected Papers (pp. 497-504). Springer. https://doi.org/10.1007/978-3-540-75867-9_63

Vancouver

Holzer A, Kinder J, Veith H. Using Verification Technology to Specify and Detect Malware. In 11th Int. Conf. Computer Aided Systems Theory (Eurocast 2007), Revised Selected Papers. Springer. 2007. p. 497-504 https://doi.org/10.1007/978-3-540-75867-9_63

Author

Holzer, Andreas ; Kinder, Johannes ; Veith, Helmut. / Using Verification Technology to Specify and Detect Malware. 11th Int. Conf. Computer Aided Systems Theory (Eurocast 2007), Revised Selected Papers. Springer, 2007. pp. 497-504

BibTeX

@inproceedings{c17cd4a021c6432b8db8ad4397c817ce,
title = "Using Verification Technology to Specify and Detect Malware",
abstract = "Computer viruses and worms are major threats for our computer infrastructure, and thus, for economy and society at large. Recent work has demonstrated that a model checking based approach to malware detection can capture the semantics of security exploits more accurately than traditional approaches, and consequently achieve higher detection rates. In this approach, malicious behavior is formalized using the expressive specification language CTPL based on classic CTL. This paper gives an overview of our toolchain for malware detection and presents our new system for computer assisted generation of malicious code specifications.",
author = "Andreas Holzer and Johannes Kinder and Helmut Veith",
year = "2007",
month = feb,
doi = "10.1007/978-3-540-75867-9_63",
language = "English",
pages = "497--504",
booktitle = "11th Int. Conf. Computer Aided Systems Theory (Eurocast 2007), Revised Selected Papers",
publisher = "Springer",

}

RIS

TY - GEN

T1 - Using Verification Technology to Specify and Detect Malware

AU - Holzer, Andreas

AU - Kinder, Johannes

AU - Veith, Helmut

PY - 2007/2

Y1 - 2007/2

N2 - Computer viruses and worms are major threats for our computer infrastructure, and thus, for economy and society at large. Recent work has demonstrated that a model checking based approach to malware detection can capture the semantics of security exploits more accurately than traditional approaches, and consequently achieve higher detection rates. In this approach, malicious behavior is formalized using the expressive specification language CTPL based on classic CTL. This paper gives an overview of our toolchain for malware detection and presents our new system for computer assisted generation of malicious code specifications.

AB - Computer viruses and worms are major threats for our computer infrastructure, and thus, for economy and society at large. Recent work has demonstrated that a model checking based approach to malware detection can capture the semantics of security exploits more accurately than traditional approaches, and consequently achieve higher detection rates. In this approach, malicious behavior is formalized using the expressive specification language CTPL based on classic CTL. This paper gives an overview of our toolchain for malware detection and presents our new system for computer assisted generation of malicious code specifications.

U2 - 10.1007/978-3-540-75867-9_63

DO - 10.1007/978-3-540-75867-9_63

M3 - Conference contribution

SP - 497

EP - 504

BT - 11th Int. Conf. Computer Aided Systems Theory (Eurocast 2007), Revised Selected Papers

PB - Springer

ER -