Basic Training Sandboxing and Virtualization Modern Tools for Combating Malware Enter Sandboxing and Application Virtualization Basic Training Application Sandboxing

نویسنده

  • Chris Greamo
چکیده

botnet infections every month, 60,000 new pieces of malware per day, and 60 percent of top Google search terms returning links to malicious sites within the first 100 results (www. mca fee.com/us/about/news/ 2010/q4/20101117-01.aspx). In fact, Cisco has reported that 10 percent of all Web malware is encountered through search engine traffic, with Google being the largest search engine provider of malicious links (www.cisco. com/en/US/prod/col latera l/ vpndevc/3q10_cisco_threat.pdf ). Although targeted malware such as Stuxnet and Aurora grabbed the headlines, most malware in McAfee’s Global Top 10 list supports cybercrime, which means the threat is largely profit driven. Another important trend we’re seeing is that users play a critical role in infecting their machines. The “Here You Have” email worm in September 2010 lured users to click on a link that installed malware and sent the message out to the users’ contacts. Also in September, an email purporting to be a LinkedIn update contained links to sites that infected users when they clicked through. While it’s clear that malware continues to be a major scourge, a study by Cyveillance in April 2010 showed that current antivirus products are largely ineffective in addressing the threat. The Cyveillance study, which included 13 of the most popular antivirus engines, found that, on average, only 19 percent of malware was detected on the first day after the malware became known. Even more shocking, the average detection rate for all 13 products only increased to 61.7 percent on average by day 30. Antivirus products are still an important component of desktop security, but it’s clear that they aren’t effective enough against a threat that prodigiously produces new malware variants by the tens of thousands every day.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Poster: Full-fledged App Sandboxing for Stock Android

We present the first concept for full-fledged app sandboxing on stock Android. Our approach is based on application virtualization and process-based privilege separation to securely encapsulate untrusted apps in an isolated environment. In contrast to all related work on stock Android, we eliminate the necessity to modify the code of monitored apps, and thereby overcome existing legal concerns ...

متن کامل

Boxify: Full-fledged App Sandboxing for Stock Android

We present the first concept for full-fledged app sandboxing on stock Android. Our approach is based on application virtualization and process-based privilege separation to securely encapsulate untrusted apps in an isolated environment. In contrast to all related work on stock Android, we eliminate the necessity to modify the code of monitored apps, and thereby overcome existing legal concerns ...

متن کامل

An invariant framework for conducting reproducible computational science

Computational reproducibility depends on the ability to not only isolate necessary and sufficient computational artifacts but also to preserve those artifacts for later re-execution. Both isolation and preservation present challenges in large part due to the complexity of existing software and systems as well as the implicit dependencies, resource distribution, and shifting compatibility of sys...

متن کامل

Measuring and Defeating Anti-Instrumentation-Equipped Malware

Malware authors constantly develop new techniques in order to evade analysis systems. Previous works addressed attempts to evade analysis by means of anti-sandboxing and anti-virtualization techniques, for example proposing to run samples on bare-metal. However, state-ofthe-art bare-metal tools fail to provide richness and completeness in the results of the analysis. In this context, Dynamic Bi...

متن کامل

iPoJ: User-Space Sandboxing for Linux 2.4

The Internet is a dangerous place. Both naı̈ve and educated users routinely become infected with viruses and accidentally run spyware despite widespread knowledge of such risks and how to avoid them. Clearly, user education is a dead-end. Another approach is to finely limit what different applications can do so that viruses and malware can’t do any damage in the first place. We observed that sys...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2011