Abstract
Malware infected computer systems can be found with increasing evidence in private and commercial fields of use. Always exposed to the risk of a “Lying End-Point”, an already manipulated security application that pretends to run on a clean computer system, the demand for new security solutions continues to rise. Project iTES (“innovative Trustworthy Endpoint Security”), government-funded by the German Federal Ministry of Education and Research, introduces a new system to enhance security while preserving usability. Based on an existing virtualized system which diversifies the software to a specific form of use, the project aims to develop new sensors to monitor the system dynamically and deliver real-time responses.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
Notes
References
Avizienis, Algirdas and Laprie, Jean-Claude. and Randell, Brian and Landwehr, Carl: Basic Concepts and Taxonomy of Dependable and Secure. In IEEE Transactions on Dependable and Secure Computing Vol. 1, No. 1. 2004, S. 11-33.
Egele, Manuel and Scholte, Theodoor and Kirda, Engin and Kruegel, Christopher: A survey on automated dynamic malware-analysis techniques and tools. In: ACM Computing Surveys, vol. 44. s.l.: ACM New York, 2008.
Garfinkel, Tal and Rosenblum, Mendel. A virtual machine introspection based architecture for intrusion detection. In: Proc. Network and Distributet Systems Security Symposium. 2003.
Microsoft. Intel TXT Homepage. [Online] 29. 04 2010.
Microsoft. Microsoft Malware Protection Center - Encyclopedia TrojanDownloader:Win32/ Perka.A. [Online] 29. 04 2010.
Pohlmann, Norbert. Trusted computing. Ein Weg zu neuen IT-Sicherheitsarchitekturen. s.l.: Vieweg, 2008.
Sahita, Ravi and Savagaonkar, Uday R. and Dewan, Prashant and Durham, David: Mitigating the Lying-Endpoint Problem in Virtualized Network Access Frameworks. In: Managing Virtu- alization of Networks and Services. Berlin, Heidelberg: Springer, 2007, S. 135-146.
Statista.com. Statista Messenger Statistics. [Online] 10. 10. 2012.
StatOwl.com. StatOwl Browser Statistics. [Online] 12. 10 2012.
WebmasterPro.com. WebmasterPro Office Suits Statistics. [Online] 10. 10. 2012.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer Fachmedien Wiesbaden
About this chapter
Cite this chapter
Speier, A., Fein, C., Bothe, D., Reich, E., Pohlmann, N. (2013). Draft of a Dynamic Malware Detection System on Trustworthy Endpoints. In: Reimer, H., Pohlmann, N., Schneider, W. (eds) ISSE 2013 Securing Electronic Business Processes. Springer Vieweg, Wiesbaden. https://doi.org/10.1007/978-3-658-03371-2_1
Download citation
DOI: https://doi.org/10.1007/978-3-658-03371-2_1
Publisher Name: Springer Vieweg, Wiesbaden
Print ISBN: 978-3-658-03370-5
Online ISBN: 978-3-658-03371-2
eBook Packages: Computer ScienceComputer Science (R0)