Skip to main content

Draft of a Dynamic Malware Detection System on Trustworthy Endpoints

  • Chapter
ISSE 2013 Securing Electronic Business Processes

Abstract

Malware infected computer systems can be found with increasing evidence in private and commercial fields of use. Always exposed to the risk of a “Lying End-Point”, an already manipulated security application that pretends to run on a clean computer system, the demand for new security solutions continues to rise. Project iTES (“innovative Trustworthy Endpoint Security”), government-funded by the German Federal Ministry of Education and Research, introduces a new system to enhance security while preserving usability. Based on an existing virtualized system which diversifies the software to a specific form of use, the project aims to develop new sensors to monitor the system dynamically and deliver real-time responses.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

eBook
USD 16.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 16.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

Notes

  1. 1.

    http://ites-project.org

References

  1. Avizienis, Algirdas and Laprie, Jean-Claude. and Randell, Brian and Landwehr, Carl: Basic Concepts and Taxonomy of Dependable and Secure. In IEEE Transactions on Dependable and Secure Computing Vol. 1, No. 1. 2004, S. 11-33.

    Google Scholar 

  2. Egele, Manuel and Scholte, Theodoor and Kirda, Engin and Kruegel, Christopher: A survey on automated dynamic malware-analysis techniques and tools. In: ACM Computing Surveys, vol. 44. s.l.: ACM New York, 2008.

    Google Scholar 

  3. Garfinkel, Tal and Rosenblum, Mendel. A virtual machine introspection based architecture for intrusion detection. In: Proc. Network and Distributet Systems Security Symposium. 2003.

    Google Scholar 

  4. Microsoft. Intel TXT Homepage. [Online] 29. 04 2010.

    Google Scholar 

  5. Microsoft. Microsoft Malware Protection Center - Encyclopedia TrojanDownloader:Win32/ Perka.A. [Online] 29. 04 2010.

    Google Scholar 

  6. Pohlmann, Norbert. Trusted computing. Ein Weg zu neuen IT-Sicherheitsarchitekturen. s.l.: Vieweg, 2008.

    Google Scholar 

  7. Sahita, Ravi and Savagaonkar, Uday R. and Dewan, Prashant and Durham, David: Mitigating the Lying-Endpoint Problem in Virtualized Network Access Frameworks. In: Managing Virtu- alization of Networks and Services. Berlin, Heidelberg: Springer, 2007, S. 135-146.

    Google Scholar 

  8. Statista.com. Statista Messenger Statistics. [Online] 10. 10. 2012.

    Google Scholar 

  9. StatOwl.com. StatOwl Browser Statistics. [Online] 12. 10 2012.

    Google Scholar 

  10. WebmasterPro.com. WebmasterPro Office Suits Statistics. [Online] 10. 10. 2012.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer Fachmedien Wiesbaden

About this chapter

Cite this chapter

Speier, A., Fein, C., Bothe, D., Reich, E., Pohlmann, N. (2013). Draft of a Dynamic Malware Detection System on Trustworthy Endpoints. In: Reimer, H., Pohlmann, N., Schneider, W. (eds) ISSE 2013 Securing Electronic Business Processes. Springer Vieweg, Wiesbaden. https://doi.org/10.1007/978-3-658-03371-2_1

Download citation

  • DOI: https://doi.org/10.1007/978-3-658-03371-2_1

  • Publisher Name: Springer Vieweg, Wiesbaden

  • Print ISBN: 978-3-658-03370-5

  • Online ISBN: 978-3-658-03371-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics