A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Panorama
2007
Proceedings of the 14th ACM conference on Computer and communications security - CCS '07
Malicious programs spy on users' behavior and compromise their privacy. Even software from reputable vendors, such as Google Desktop and Sony DRM media player, may perform undesirable actions. Unfortunately, existing techniques for detecting malware and analyzing unknown code samples are insufficient and have significant shortcomings. We observe that malicious information access and processing behavior is the fundamental trait of numerous malware categories breaching users' privacy (including
doi:10.1145/1315245.1315261
dblp:conf/ccs/YinSEKK07
fatcat:6bs4cgn565axdg43rpyrgbra6e