Every day, security organisations analyse thousands of new files and URLs, identifying the harmful ones to constantly improve their knowledge of computer threats. It is hard to guess whether a file or URL could be harmful or not without executing it, and executing unknown malicious software is dangerous. Every day, security organisations analyse thousands of new files and URLs, identifying the harmful ones to constantly improve their knowledge of threats. Matteo Cafasso and Mathieu Tarral of F-Secure explore design patterns and technologies for this kind of analysis, and look at an architectural design aiming to produce a flexible and maintainable sandboxing platform. They also discuss the introduction of a software development kit (SDK).
%0 Journal Article
%1 CAFASSO20185
%A Cafasso, Matteo
%A Tarral, Mathieu
%D 2018
%J Computer Fraud & Security
%K sendate sendate-planets
%N 2
%P 5 - 9
%R https://doi.org/10.1016/S1361-3723(18)30013-7
%T Designing flexible sandboxing solutions to adapt to new malware trends
%U http://www.sciencedirect.com/science/article/pii/S1361372318300137
%V 2018
%X Every day, security organisations analyse thousands of new files and URLs, identifying the harmful ones to constantly improve their knowledge of computer threats. It is hard to guess whether a file or URL could be harmful or not without executing it, and executing unknown malicious software is dangerous. Every day, security organisations analyse thousands of new files and URLs, identifying the harmful ones to constantly improve their knowledge of threats. Matteo Cafasso and Mathieu Tarral of F-Secure explore design patterns and technologies for this kind of analysis, and look at an architectural design aiming to produce a flexible and maintainable sandboxing platform. They also discuss the introduction of a software development kit (SDK).
@article{CAFASSO20185,
abstract = {Every day, security organisations analyse thousands of new files and URLs, identifying the harmful ones to constantly improve their knowledge of computer threats. It is hard to guess whether a file or URL could be harmful or not without executing it, and executing unknown malicious software is dangerous. Every day, security organisations analyse thousands of new files and URLs, identifying the harmful ones to constantly improve their knowledge of threats. Matteo Cafasso and Mathieu Tarral of F-Secure explore design patterns and technologies for this kind of analysis, and look at an architectural design aiming to produce a flexible and maintainable sandboxing platform. They also discuss the introduction of a software development kit (SDK).},
added-at = {2019-02-11T16:20:11.000+0100},
author = {Cafasso, Matteo and Tarral, Mathieu},
biburl = {https://www.bibsonomy.org/bibtex/289bc186667138f6ace34496f469d9442/savolainenpekka},
doi = {https://doi.org/10.1016/S1361-3723(18)30013-7},
interhash = {1e54e63233b05c17ee8da9b768088289},
intrahash = {89bc186667138f6ace34496f469d9442},
issn = {1361-3723},
journal = {Computer Fraud & Security},
keywords = {sendate sendate-planets},
number = 2,
pages = {5 - 9},
timestamp = {2019-02-11T16:20:11.000+0100},
title = {Designing flexible sandboxing solutions to adapt to new malware trends},
url = {http://www.sciencedirect.com/science/article/pii/S1361372318300137},
volume = 2018,
year = 2018
}