TY - GEN
T1 - Computing the behavior of malicious code with function extraction technology
AU - Linger, Richard
AU - Prowell, Stacy
AU - Sayre, Kirk
PY - 2009
Y1 - 2009
N2 - Modern society is irreversibly dependent on computerbased infrastructure systems of astonishing scope and complexity. Yet these systems are increasingly vulnerable to disabling intrusions by adversaries equipped with the knowledge and resources to mount sophisticated attacks [1,2]. Technical and organizational preparation for major attacks is essential to national security. Preparation takes time and effort, and when a major attack occurs, it is too late to prepare. Preparation must provide capability for fast and precise analysis of the technical structure of an attack as a basis for fast response to limit damage and deploy countermeasures.
AB - Modern society is irreversibly dependent on computerbased infrastructure systems of astonishing scope and complexity. Yet these systems are increasingly vulnerable to disabling intrusions by adversaries equipped with the knowledge and resources to mount sophisticated attacks [1,2]. Technical and organizational preparation for major attacks is essential to national security. Preparation takes time and effort, and when a major attack occurs, it is too late to prepare. Preparation must provide capability for fast and precise analysis of the technical structure of an attack as a basis for fast response to limit damage and deploy countermeasures.
UR - http://www.scopus.com/inward/record.url?scp=70350696028&partnerID=8YFLogxK
U2 - 10.1145/1558607.1558648
DO - 10.1145/1558607.1558648
M3 - Conference contribution
AN - SCOPUS:70350696028
SN - 9781605585185
T3 - ACM International Conference Proceeding Series
BT - CSIIRW09
T2 - CSIIRW 2009: 5th Annual Cyber Security and Information Intelligence Research Workshop: Cyber Security and Information Intelligence Challenges and Strategies
Y2 - 13 April 2009 through 15 April 2009
ER -