Malware Detection

  • Mihai Christodorescu
  • Somesh Jha
  • Douglas Maughan
  • Dawn Song
  • Cliff Wang
Conference proceedings

Part of the Advances in Information Security book series (ADIS, volume 27)

Table of contents

  1. Front Matter
    Pages I-XI
  2. Overview

    1. Front Matter
      Pages 1-1
  3. Software Analysis and Assurance

    1. Front Matter
      Pages 17-17
    2. Giovanni Vigna
      Pages 19-41
    3. Thomas Reps, Gogul Balakrishnan, Junghee Lim, Tim Teitelbaum
      Pages 43-61
    4. William G. J. Halfond, Alessandro Orso
      Pages 85-109
  4. Distributed Threat Detection and Defense

    1. Front Matter
      Pages 111-111
    2. Nicholas Weaver, Stuart Staniford, Vern paxson
      Pages 113-145
    3. David Brumley, James Newsome, Dawn Song
      Pages 147-170
    4. Paul Barford, Vinod Yegneswaran
      Pages 171-191
    5. Mihai Christodorescu, Shai Rubin
      Pages 193-209
  5. Stealthy and Targeted Threat Detection and Defense

    1. Front Matter
      Pages 211-211
    2. Stelios Sidiroglou, Angelos D. Keromytis
      Pages 213-229
    3. Salvatore J. Stolfo, Ke Wang, Wei-Jen Li
      Pages 231-249
  6. Novel Techniques for Constructing Trustworthy Services

    1. Front Matter
      Pages 251-251
    2. Arvind Seshadri, Mark Luk, Adrian Perrig, Leendert van Doom, Pradeep Khosla
      Pages 253-289
    3. Geoffrey Smith
      Pages 291-307
  7. Back Matter
    Pages 309-312

About these proceedings


Many malicious attacks are achieved by malicious code or malware, such as viruses and worms. Shared resources, such as the Internet, have created a highly interconnected cyber-infrastructure. Critical infrastructures in domains such as medical, power, telecommunications, and finance are highly dependent on information systems. These two factors have exposed our critical infrastructures to malicious attacks and accidental failures. Given the deleterious affects of malware on our cyber infrastructure, identifying malicious programs is an important goal. Unfortunately, malware detectors have not kept pace with the evasion techniques commonly used by hackers--the good guys are falling behind in the arms race.

Malware Detection, based on the Special ARO/DHS Workshop on Malware Detection at Rosslyn, VA, in 2005, captures the state of the art research in the area of malicious code detection, prevention and mitigation.

This edited volume is intended for researchers and developers working on malicious code (malware) detection, prevention and mitigation. In addition it can be used for a senior level undergraduate course, or for a graduate course in the area of computer and software security.



Binary software analysis Cooperative detection Detection Information Malware Obfuscated and stealthy malware SQL Security Software Integrity and Assurance Trustworthy systems code communication

Editors and affiliations

  • Mihai Christodorescu
    • 1
  • Somesh Jha
    • 1
  • Douglas Maughan
    • 2
  • Dawn Song
    • 3
  • Cliff Wang
    • 4
  1. 1.Computer Sciences DepartmentUniversity of WisconsinMadison
  2. 2.Dept. of Homeland SecurityWashington D.C.
  3. 3.Carnegie Mellon UniversityPittsburgh
  4. 4.Computing and Information Science Div.U.S. Army Research OfficeResearch Triangle ParkNC

Bibliographic information

Industry Sectors
Materials & Steel
Finance, Business & Banking
IT & Software
Consumer Packaged Goods
Energy, Utilities & Environment
Oil, Gas & Geosciences