Computing the behavior of malicious code with function extraction technology

Richard Linger, Stacy Prowell, Kirk Sayre

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

2 Scopus citations

Abstract

Modern society is irreversibly dependent on computerbased infrastructure systems of astonishing scope and complexity. Yet these systems are increasingly vulnerable to disabling intrusions by adversaries equipped with the knowledge and resources to mount sophisticated attacks [1,2]. Technical and organizational preparation for major attacks is essential to national security. Preparation takes time and effort, and when a major attack occurs, it is too late to prepare. Preparation must provide capability for fast and precise analysis of the technical structure of an attack as a basis for fast response to limit damage and deploy countermeasures.

Original languageEnglish
Title of host publicationCSIIRW09
Subtitle of host publicationFifth Annual Cyber Security and Information Intelligence Research Workshop: Cyber Security and Information Intelligence Challenges and Strategies
DOIs
StatePublished - 2009
Externally publishedYes
EventCSIIRW 2009: 5th Annual Cyber Security and Information Intelligence Research Workshop: Cyber Security and Information Intelligence Challenges and Strategies - Oak Ridge, TN, United States
Duration: Apr 13 2009Apr 15 2009

Publication series

NameACM International Conference Proceeding Series

Conference

ConferenceCSIIRW 2009: 5th Annual Cyber Security and Information Intelligence Research Workshop: Cyber Security and Information Intelligence Challenges and Strategies
Country/TerritoryUnited States
CityOak Ridge, TN
Period04/13/0904/15/09

Fingerprint

Dive into the research topics of 'Computing the behavior of malicious code with function extraction technology'. Together they form a unique fingerprint.

Cite this