Skip to main content

Malware Evolution: A Snapshot of Threats and Countermeasures in 2005

  • Conference paper
Book cover Malware Detection

Part of the book series: Advances in Information Security ((ADIS,volume 27))

Abstract

Speed, stealth, and purpose of malware [1] threats and countermeasures are evolving quickly. This chapter describes these three facets of current malware threats, and describes a few countermeasures emerging to better address such threats.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 259.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 329.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 329.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. AOLINCSA Online Safety Study, Conducted by America Online and the National Cyber Security Alliance, October 2004, http:Nww.staysafeonline.info/pdf/safety-study-vO4.pdf

    Google Scholar 

  2. G. Balakrishnan, et. al, “Model checking x86 executables with Code-Surferlx86 and WPDS++,” (tool-demonstration paper). In Proc. Computer-Aided Verification, 2005. http://ww.cs.wisc.edu/wpis/papers/CAVOS-tool-demo.pdf

    Google Scholar 

  3. G. Balakrishnan, et. al, “WYSINWYX: What You See Is Not What You execute.” To appear in Proc. IFIP Working Conference on Verified Software: Theories, Tools, Experiments, Zurich, Switzerland, Oct.10-1 3,2005. http://ww.cs.wisc.eddwpis/papers/wysinwyxO5.pdf

    Google Scholar 

  4. D. Bank, “Computer Worm Is Turning Faster,” The Wall Street Journal, May 27,2004.

    Google Scholar 

  5. C. Cadar and D. Engler, “Execution Generated Test Cases: How to Make Systems Code Crash Itself,” CSTR-2005-04, http://www.stanford.edd-engler/cstr-3.25.5.pdf

    Google Scholar 

  6. M. Costa, et. al, “Vigilante: End-to-End Containment of Internet Worms,” ACM SIGOPS Operating Systems Review, Volume 39, Issue 5 (December 2005), http://research.microsoR.com/-manuelc/MS_igilanteSOSP.pdf

    Google Scholar 

  7. J. Crandall, et. al, “On Deriving Unknown Vulnerabilities from Zero-Day Polymorphic and Metamorphic Worm Exploits,” 12th ACM Conference on Computer and Communications Security (CCS). Alexandria, Virginia. November 2005, http://wwwcsif.cs.ucdavis.edu/-crandall/ccsdacoda.pdf

    Google Scholar 

  8. J. Evers, “Dutch police nab suspected’ bot herders,” CNET, October 7, 2005,3:41 PM PDT

    Google Scholar 

  9. T. Fraser, “Automatic Discovery of Integrity Constraints in Binary Kernel Modules,” UMIACS TR-2005-02, December 2004, http://www.missl.cs.umd.edd-tfraser/TRs/fraser-copilot-config.pdf

    Google Scholar 

  10. P. Godefroid, et. al, “DART: Directed Automated Random Testing,” to appear in PLDIOS, http://cm.bell-labs.com/who/god/public_pldi2005.pdf

    Google Scholar 

  11. W. Halfond and A. Orso, “AMNESIA: Analysis and Monitoring for NEutralizing SQLInjection Attacks,” http://www.cc.gatech.edu/grads/w/whaKond/papershalfond.orso.ASE O5.pdf

    Google Scholar 

  12. S. A. Hofmeyr, et. al, “Intrusion Detection using Sequences of System Calls,” Journal of Computer Security Vol. 6, pp. 151–180 (1998). http://cs.unm.edu/-forrest/publications/int_decssc.pdf

    Google Scholar 

  13. M. W. Jon and J. A. Rochlis, “With Microscope and Tweezers: An Analysis of the Internet Virus of November 1988,” http://web.rnit.eddeichin/www/virus/main.html

    Google Scholar 

  14. J. O. Kephart and W. C. Arnold, “Automatic Extraction of Computer Virus Signatures,“In Proceedings of teh 4th Virus Bulletin International Conference, R. Ford, ed., Virus Bulletin Ltd., Abingdon, England, 1994, PP. 178–184, http://www.research.ibm.com/antivirus/SciPapers/Kepha_B94/vb94.html

    Google Scholar 

  15. C. Kreibich and J. Crowcroft, “Honeycomb: Creating Intrusion Detection Signatures Using Honeypots,” In Proceedings of the USENIXIACM Workshop on Hot Topics in Networking, Nov. 2003. http://citeseer.ist.psu.edu/cache/papers/cs/30348/http:zSzzSznms.lcs.m it.eduzSzHotNets-IIzSzpaperszSzhoneycomb.pdfkeibichO3 honey com b.pdf

    Google Scholar 

  16. C. Kruegel, et. al, “Detecting Kernel-Level Rootkits Through Binary Analysis,” Proceedings of the Annual Computer Security Applications Conference (ACSAC) 91–100 Tucson, AZ December 2004, http://www.cs.ucsb.edu/-vigna/publications.html

    Google Scholar 

  17. C. Kruegel, et. al, “Automating Mimicry Attacks Using Static Binary Analysis,” Proceedings of the USENIX Security Symposium Baltimore, MD August 2005, http://www.cs.ucsb.edu/-vigna/pub/2005_kmegel_kirda_robe_son_m utz-vigna-USENIX05.pdf

    Google Scholar 

  18. L. Mearian, “System break-in nets hackers 8 million credit card numbers,” COMPUTERWORLD, February 24, 2003, http://www.computenvorld.com/securitytopics/security/story/O,10801,78747,00.html

    Google Scholar 

  19. D. Moore and C. Shannon, “The Spread of the Code-Red Worm (CRV2),” http://www.caida.org/analysis/security/code-red/coderedv2_analysis.x ml

    Google Scholar 

  20. C. Nachenberg, “Generic Exploit Blocking,” Virus Bulletin, February, 2005

    Google Scholar 

  21. J. Newsome, et. al, “Automatically Generating Signatures for Polymorphic Worms,” in the Proceedings of the IEEE Symposium on Security and Privacy (Oakland 2005), Oakland, CA, May, 2005. http://www.cs.ucl.ac.uk_staff/B.Karp/polygraph-oakland2005.pdf

    Google Scholar 

  22. J. Newsome and D. Song, “Dynamic Taint Analysis for Automatic Detection, Analysis, and Signature Generation of Exploits on Commodity Software,” In Proceedings of the 12th Annual Network and Distributed System Security Symposium (NDSS’ 05), February 2005. http://www.ece.cmu.edu/-jnewsome/docs/taintcheck.pdf

    Google Scholar 

  23. N. L. Petroni, Jr., et. al, “Copilot-a Coprocessor-based Kernel Runtime Integrity Monitor,” 13th Usenix Security Symposium 2004, http://www.jesusmolina.com/docs/copilot.pdf

    Google Scholar 

  24. J. Roculan, et. al, “DeepSight™ Threat Management System Threat Analysis: SQLExp SQL Server Worm,” http://securityresponse.symantec.com/avcenter/Analysis-SQLExp.pdf, January 25,2003

    Google Scholar 

  25. S. Sidiroglou, et. al, “An Emailworm Vaccine Architecture,” In Proceedings of the 1st Information Security Practice and Experience Conference (ISPEC), pp. 97–108. April 2005, Singapore. http://www 1.cs.columbia.edu/-angelosPapers/2005/email-worm.pdf

    Google Scholar 

  26. S. Sidiroglou and A. Keromytis, “Countering Network Worms Through Automatic Patch Generation,” In IEEE Security & Privacy, vol. 3, no. 6, PP. 52–60, November/December 2005, http://www1.cs.columbia.edu/-angelos/Papers/2005/j6ker3.pdf

    Google Scholar 

  27. S. Singh, “Automated Worm Fingerprinting,” Proceedings of the ACMIUSENIX Symposium on Operating System Design and Implementation, San Francisco, CA, December 2004. http://www.cs.ucsd.edu/-savage/papers/OSDIO4.pdf

    Google Scholar 

  28. S. Sparks and J. Butler, “Shadow Walker-Raising The Bar For Rootkit Detection,” DefCon 13, July 29-31, 2005, http://ww.blackhat.codpresentations/bh-jp-05/bh-jp-05-sparks-butle r.pdf

    Google Scholar 

  29. S. Staniford, et. al, “How to Own the Internet in Your Spare Time,” Proceedings of the 1 lth USENIX Security Symposium (Security’ 02) http://www.cs.berkeley.edu/-nweaver/cdc.web/cdc.web.pdf

    Google Scholar 

  30. Symantec Internet Security Threat Report, Volume VII, Published March 2005

    Google Scholar 

  31. Symantec Internet Security Threat Report, Volume VIII, Published September 2005

    Google Scholar 

  32. J. Swartz, “40 million credit card holders may be at risk,” USA TODAY, June 19, 2005, http://www.usatoday.com/money/perfi/general/2005-0 19-breach-usat-x.htm

    Google Scholar 

  33. F. Valeur, et. al, “A Learning-Based Approach to the Detection of SQL Attacks,“ Proceedings of the Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA) Vienna, Austria July 2005, http://www.cs.ucsb.edu/-vigna/publications.html

    Google Scholar 

  34. H. J. Wang, C. Guo, D. R. Simon, and A. Zugenmaier. Shield: Vulnerability-Driven Network Filters for Preventing Known Vulnerability Exploits. Proceedings of the ACM SIGCOMM Conference, Aug. 2004. http://citeseer.ist.psu.edu/cache/papers/cs2/162/http:zSzzSzresearch.mi crosofi. comzSzresearchzSzshieldzSzpaperszSzshieldSigcommO4.pdf/wan g04shield.pdf

    Google Scholar 

  35. K. Wang, et. al, “Anomalous Payload-based Worm Detection and Signature Generation,” In Proceedings of the Eighth International Symposium on Recent Advances in Intrusion Detection, September 2005, http://worminator.cs.columbia.edu/papers/2005/raid-cut4.pdf

    Google Scholar 

  36. Y.-M. Wang, et. al, “Automated Web Patrol with Strider HoneyMonkeys: Finding Web Sites That Exploit Browser Vulnerabilities” MSR-TR-2005-72, August 2005 fip://fip.research.microsoR.comlpub/tr/TR-2005-72.pdf

    Google Scholar 

  37. M. Williamson, et. al, “Virus Throttling,” HPL-2003-69 20030430, Virus Bulletin, March 2003, http://www.hpl.hp.com_techreports/2003/HPL-2003-69.htm1

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer Science+Business Media, LLC.

About this paper

Cite this paper

Witten, B., Nachenberg, C. (2007). Malware Evolution: A Snapshot of Threats and Countermeasures in 2005. In: Christodorescu, M., Jha, S., Maughan, D., Song, D., Wang, C. (eds) Malware Detection. Advances in Information Security, vol 27. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-44599-1_1

Download citation

  • DOI: https://doi.org/10.1007/978-0-387-44599-1_1

  • Publisher Name: Springer, Boston, MA

  • Print ISBN: 978-0-387-32720-4

  • Online ISBN: 978-0-387-44599-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics