Back to Results
First PageMeta Content
Malware / Computing / Rootkit / Botnet / Fast flux / Computer virus / Antivirus software / Cyberwarfare / Computer security


Prudent Practices for Designing Malware Experiments: Status Quo and Outlook Christian Rossow∗‡ , Christian J. Dietrich∗ , Chris Grier†§ , Christian Kreibich†§ , Vern Paxson†§ , Norbert Pohlmann∗ , Herber
Add to Reading List

Document Date: 2012-03-17 04:52:06


Open Document

File Size: 233,07 KB

Share Result on Facebook

Company

Bayer / S&P / Milani Comp. / Microsoft / /

/

Facility

The Network Institute / VU University / University of California / International Computer Science Institute / /

IndustryTerm

Internet access / software configuration / anomaly detection systems / simulated Internet environments / Dynamic malware analysis systems / malware execution systems / containment solution / rogue networks / software installations / installed software / pay-per-install networks / malware detection technologies / university networks / accessible networks / Internet Malware Automatically Generating Models / Online Botnet Detection Based / legitimate software / software configurations / Internet Added user interaction Used / /

MarketIndex

S&P 2010 / /

OperatingSystem

DoS / Windows XP / /

Organization

Institute for Internet Security / International Computer Science Institute / University of California / Berkeley / VU University Amsterdam / U.S. Securities and Exchange Commission / Network Institute / /

Person

Christian J. Dietrich / Herbert Bos / Christian Kreibich / Chris Grier / Norbert Pohlmann / /

Position

advocate / author / Dynamic Malware Analysis Inspector / MP / kernel driver / representative / judge / /

Product

Resistant Injection / /

ProgrammingLanguage

FP / /

Technology

virtual machine / control network / DNS / malware detection technologies / HTTP / machine learning / operating system / html / operating systems / RAID / /

URL

http /

SocialTag