2017 IEEE Symposium on Security and Privacy (SP) 2017
DOI: 10.1109/sp.2017.59
|View full text |Cite
|
Sign up to set email alerts
|

A Lustrum of Malware Network Communication: Evolution and Insights

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
40
0

Year Published

2017
2017
2019
2019

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 63 publications
(40 citation statements)
references
References 30 publications
0
40
0
Order By: Relevance
“…One important aspect when systematizing the analysis of malware is properly curating the dataset [23]. We perform the following sanity checks for each sample processed: (i) is it malware?…”
Section: B Sanity Checksmentioning
confidence: 99%
“…One important aspect when systematizing the analysis of malware is properly curating the dataset [23]. We perform the following sanity checks for each sample processed: (i) is it malware?…”
Section: B Sanity Checksmentioning
confidence: 99%
“…In effect, the code became longer and more complicated for analysis. The longest observed Locky first stage code has a length slightly more than 1 Megabyte -exactly 1064661 bytes 2 . The code presented in the Fig.…”
Section: Locky Case Studymentioning
confidence: 99%
“…In the most cases the second stage code is hosted on web servers (sites hacked without the knowledge of their owners). The more detailed description of attack techniqes used nowadays can be found in [1] [2]. Some of them are also discussed with a QNAP NAS vulnerability case study presented in [3].…”
Section: Introductionmentioning
confidence: 99%
“…Similarly, AndroidLeaks [38] uses data-flow analysis to evaluate Android applications for leaks of private information; they verified leaks in 2,342 applications. Lever et al show in a longitudinal study of malware [53] that analysis of network traffic is a key factor to early detection.…”
Section: Privacy Leaks In Other Platformsmentioning
confidence: 99%
“…Thus, this approach builds on a fundamental invariant of tracking and user privacy violation. Furthermore, long term studies of malware have highlighted network activity as a particularly effective medium for detecting malicious activity [53]. I model features that are intrinsic to the network traffic generated by trackers to distinguish malicious from benign traffic.…”
Section: Introductionmentioning
confidence: 99%