Skip to main content

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 799.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 949.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Recommended Reading

  1. Baliga A, Ganapathy V, Iftode L (2008) Automatic inference and enforcement of kernel data structure invariants. In: ACSAC’08: Proceedings of the 24th Annual Computer Security Applications Conference, Anaheim, 8–12 December 2008. IEEE Computer Society Press, Los Alamitos, pp 77–86. http://dx.doi.org/10.1109/ACSAC.2008.29.

  2. Christodorescu M, Kruegel C, Jha S (2007) Mining specifications of malicious behavior. In: Proceedings of the 6th Joint Meeting of the European Software Engineering Conference and the 14th ACM SIGSOFT Symposium on the Foundations of Software Engineering (ESEC/FSE’07), Dubrovnik, 3–7 September 2007. ACM Press, New York, pp 5–14

    Google Scholar 

  3. Comparetti PM, Salvaneschi G, Kolbitsch C, Kruegel C, Kirda E, Zanero S (2010) Identifying dormant functionality in malware programs. In: 31st IEEE Symposium on Security and Privacy (SP 2010), Berkeley/Oakland, 16–19 May 2010. IEEE Computer Society Press, Los Alamitos

    Google Scholar 

  4. Feng HH, Kolesnikov OM, Fogla P, Lee W, Gong W (2003) Anomaly detection using call stack information. In: Proceedings 2003 IEEE Symposium on Security and Privacy, Berkeley, 11–14 May 2003. IEEE Computer Society Press, Los Alamitos, p 62

    Google Scholar 

  5. Ganapathy V, Jaeger T, Jha S (2006) Retrofitting legacy code for authorization policy enforcement. In: 2006 IEEE Symposium on Security and Privacy (SP’06): Proceedings, Oakland, 21–24 May 2006. IEEE Computer Society Press, Los Alamitos, pp 214–229. http://doi.ieeecomputersociety.org/10.1109/SP.2006.34.

  6. Giffin JT, Dagon D, Jha S, Lee W, Miller BP (2005) Environment-sensitive intrusion detection. In: Valdes A, Zamboni D (eds) Recent Advances In Intrusion Detection: 8th international symposium, RAID 2005, Seattle, 7–9 September 2005. Lecture notes in computer science, vol 3858. Springer, Berlin, pp 185–206

    Google Scholar 

  7. Godefroid P, Klarlund N, Sen K (2005) Dart: directed automated random testing. In: PLDI ’05: Proceedings of the 2005 ACM SIGPLAN Conference on Programming Language Design and Implementation, vol 40, Chicago, 12–15 June 2005. ACM Press, New York, pp 213–223

    Google Scholar 

  8. Hildebrandt R, Zeller A (2002) Simplifying and isolating failure-inducing input. IEEE Trans Softw Eng 28(2):183–200

    Google Scholar 

  9. Liblit BR (2004) Cooperative bug isolation. PhD thesis, University of California, Berkeley, December 2004

    Google Scholar 

  10. Martignoni L, Christodorescu M, Jha S (2007) Omniunpack: fast, generic, and safe unpacking of malware. In: Proceedings of the Annual Computer Security Applications Conference (ACSAC), Miami Beach, FL, December 2007

    Google Scholar 

  11. Moser A, Kruegel C, Kirda E (2007) Exploring multiple execution paths for malware analysis. In: SP’07: Proceedings of the 2007 IEEE Symposium on Security and Privacy, Berkeley, 20–23 May 2007. IEEE Computer Society Press, Los Alamitos, pp 231–245

    Google Scholar 

  12. Sekar R, Bendre M, Dhurjati D, Bollineni P (2001) A fast automaton-based method for detecting anomalous program behaviors. In: Proceedings of the 2001 IEEE Symposium on Security and Privacy, Oakland, 14–16 May 2001. IEEE Computer Society Press, Los Alamitos, pp 144–155

    Google Scholar 

  13. Wagner D, Dean D (2001) Intrusion detection via static analysis. In: Proceedings of the 2001 IEEE Symposium on Security and Privacy (S&P’01), Oakland, 14–16 May 2001. IEEE Computer Society Press, Los Alamitos

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer Science+Business Media, LLC

About this entry

Cite this entry

Christodorescu, M., Ganapathy, V. (2011). Dynamic Analysis. In: van Tilborg, H.C.A., Jajodia, S. (eds) Encyclopedia of Cryptography and Security. Springer, Boston, MA. https://doi.org/10.1007/978-1-4419-5906-5_836

Download citation

Publish with us

Policies and ethics