Malware Detection

  • Mihai Christodorescu
  • Somesh Jha
  • Douglas Maughan
  • Dawn Song
  • Cliff Wang
Conference proceedings

DOI: 10.1007/978-0-387-44599-1

Part of the Advances in Information Security book series (ADIS, volume 27)

Table of contents (13 papers)

  1. Front Matter
    Pages I-XI
  2. Overview

    1. Front Matter
      Pages 1-1
  3. Software Analysis and Assurance

    1. Front Matter
      Pages 17-17
    2. Static Disassembly and Code Analysis
      Giovanni Vigna
      Pages 19-41
    3. A Next-Generation Platform for Analyzing Executables
      Thomas Reps, Gogul Balakrishnan, Junghee Lim, Tim Teitelbaum
      Pages 43-61
    4. Detection and Prevention of SQL Injection Attacks
      William G. J. Halfond, Alessandro Orso
      Pages 85-109
  4. Distributed Threat Detection and Defense

    1. Front Matter
      Pages 111-111
    2. Very Fast Containment of Scanning Worms, Revisited
      Nicholas Weaver, Stuart Staniford, Vern paxson
      Pages 113-145
    3. Sting: An End-to-End Self-Healing System for Defending against Internet Worms
      David Brumley, James Newsome, Dawn Song
      Pages 147-170
    4. An Inside Look at Botnets
      Paul Barford, Vinod Yegneswaran
      Pages 171-191
    5. Can Cooperative Intrusion Detectors Challenge the Base-Rate Fallacy?
      Mihai Christodorescu, Shai Rubin
      Pages 193-209
  5. Stealthy and Targeted Threat Detection and Defense

    1. Front Matter
      Pages 211-211
    2. Composite Hybrid Techniques For Defending Against Targeted Attacks
      Stelios Sidiroglou, Angelos D. Keromytis
      Pages 213-229
    3. Towards Stealthy Malware Detection
      Salvatore J. Stolfo, Ke Wang, Wei-Jen Li
      Pages 231-249
  6. Novel Techniques for Constructing Trustworthy Services

    1. Front Matter
      Pages 251-251
    2. Pioneer: Verifying Code Integrity and Enforcing Untampered Code Execution on Legacy Systems
      Arvind Seshadri, Mark Luk, Adrian Perrig, Leendert van Doom, Pradeep Khosla
      Pages 253-289
    3. Principles of Secure Information Flow Analysis
      Geoffrey Smith
      Pages 291-307
  7. Back Matter
    Pages 309-312

About these proceedings


Many malicious attacks are achieved by malicious code or malware, such as viruses and worms. Shared resources, such as the Internet, have created a highly interconnected cyber-infrastructure. Critical infrastructures in domains such as medical, power, telecommunications, and finance are highly dependent on information systems. These two factors have exposed our critical infrastructures to malicious attacks and accidental failures. Given the deleterious affects of malware on our cyber infrastructure, identifying malicious programs is an important goal. Unfortunately, malware detectors have not kept pace with the evasion techniques commonly used by hackers--the good guys are falling behind in the arms race.

Malware Detection, based on the Special ARO/DHS Workshop on Malware Detection at Rosslyn, VA, in 2005, captures the state of the art research in the area of malicious code detection, prevention and mitigation.

This edited volume is intended for researchers and developers working on malicious code (malware) detection, prevention and mitigation. In addition it can be used for a senior level undergraduate course, or for a graduate course in the area of computer and software security.



Binary software analysis Cooperative detection Detection Information Malware Obfuscated and stealthy malware SQL Security Software Integrity and Assurance Trustworthy systems code communication

Editors and affiliations

  • Mihai Christodorescu
    • 1
  • Somesh Jha
    • 1
  • Douglas Maughan
    • 2
  • Dawn Song
    • 3
  • Cliff Wang
    • 4
  1. 1.Computer Sciences DepartmentUniversity of WisconsinMadison
  2. 2.Dept. of Homeland SecurityWashington D.C.
  3. 3.Carnegie Mellon UniversityPittsburgh
  4. 4.Computing and Information Science Div.U.S. Army Research OfficeResearch Triangle ParkNC

Bibliographic information

  • Copyright Information Springer Science+Business Media, LLC. 2007
  • Publisher Name Springer, Boston, MA
  • eBook Packages Computer Science
  • Print ISBN 978-0-387-32720-4
  • Online ISBN 978-0-387-44599-1
  • Series Print ISSN 1568-2633