18th Annual Computer Security Applications Conference, 2002. Proceedings.
DOI: 10.1109/csac.2002.1176291
|View full text |Cite
|
Sign up to set email alerts
|

Protecting data from malicious software

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
11
0

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 12 publications
(13 citation statements)
references
References 6 publications
0
11
0
Order By: Relevance
“…This is good because slow spreading viruses are easier to combat with slow responses such as signature based scanning. A consequence of this may be that payloads become more malicious, in which case the techniques of behaviour blocking (Messmer, 2002;Schmid et al, 2002) would be good mechanisms to prevent damage on the host machine.…”
Section: Discussionmentioning
confidence: 99%
“…This is good because slow spreading viruses are easier to combat with slow responses such as signature based scanning. A consequence of this may be that payloads become more malicious, in which case the techniques of behaviour blocking (Messmer, 2002;Schmid et al, 2002) would be good mechanisms to prevent damage on the host machine.…”
Section: Discussionmentioning
confidence: 99%
“…Other related approaches exist. Schmid et al (2002) describe the FileMonster scheme, which tags particular files as requiring user confirmation before applications can access them. The SubOS scheme, proposed by Ioannidis et al (2002), associates policies with files based on their origin on the network, and processes are restricted by the policies of all the files they have accessed.…”
Section: Figure 3: Typical Rule-based System-wide Controlmentioning
confidence: 99%
“…Results were reported as affirmative, although no inferential statistics were employed. Schmid et al (2002) also conducted a simple evaluation of the FileMonster scheme that measured the number of times the tool required user interaction.…”
Section: Application Restrictions and Usabilitymentioning
confidence: 99%
“…It requires the defender to identify its sensitive and critical data first, and define policies and rules in a DLP application for protection. An example research solution is [21].…”
Section: Data Loss Preventionmentioning
confidence: 99%