scispace - formally typeset
Search or ask a question
Institution

Symantec

CompanyMountain View, California, United States
About: Symantec is a company organization based out in Mountain View, California, United States. It is known for research contribution in the topics: Backup & Malware. The organization has 2540 authors who have published 4193 publications receiving 90237 citations. The organization is also known as: Symantec.
Topics: Backup, Malware, Computer file, Stub file, File system


Papers
More filters
Journal ArticleDOI
TL;DR: The Global Burden of Disease, Injuries, and Risk Factor study 2013 (GBD 2013) as discussed by the authors provides a timely opportunity to update the comparative risk assessment with new data for exposure, relative risks, and evidence on the appropriate counterfactual risk distribution.

5,668 citations

Journal ArticleDOI
TL;DR: Patterns of the epidemiological transition with a composite indicator of sociodemographic status, which was constructed from income per person, average years of schooling after age 15 years, and the total fertility rate and mean age of the population, were quantified.

1,609 citations

Patent
29 Oct 2007
TL;DR: In this article, a flow processing facility for inspecting payloads of network traffic packets detects security threats and intrusions across accessible layers of the IP-stack by applying content matching and behavioral anomaly detection techniques based on regular expression matching and self-organizing maps.
Abstract: A flow processing facility, which uses a set of artificial neurons for pattern recognition, such as a self-organizing map, in order to provide security and protection to a computer or computer system supports unified threat management based at least in part on patterns relevant to a variety of types of threats that relate to computer systems, including computer networks. Flow processing for switching, security, and other network applications, including a facility that processes a data flow to address patterns relevant to a variety of conditions are directed at internal network security, virtualization, and web connection security. A flow processing facility for inspecting payloads of network traffic packets detects security threats and intrusions across accessible layers of the IP-stack by applying content matching and behavioral anomaly detection techniques based on regular expression matching and self-organizing maps. Exposing threats and intrusions within packet payload at or near real-time rates enhances network security from both external and internal sources while ensuring security policy is rigorously applied to data and system resources. Intrusion Detection and Protection (IDP) is provided by a flow processing facility that processes a data flow to address patterns relevant to a variety of types of network and data integrity threats that relate to computer systems, including computer networks.

1,428 citations

Journal ArticleDOI
TL;DR: The notion of a system's attack surface is formalized and an attack surface metric is introduced to measure the attack surface in a systematic manner and is useful in multiple phases of the software development lifecycle.
Abstract: Measurement of software security is a long-standing challenge to the research community. At the same time, practical security metrics and measurements are essential for secure software development. Hence, the need for metrics is more pressing now due to a growing demand for secure software. In this paper, we propose using a software system's attack surface measurement as an indicator of the system's security. We formalize the notion of a system's attack surface and introduce an attack surface metric to measure the attack surface in a systematic manner. Our measurement method is agnostic to a software system's implementation language and is applicable to systems of all sizes; we demonstrate our method by measuring the attack surfaces of small desktop applications and large enterprise systems implemented in C and Java. We conducted three exploratory empirical studies to validate our method. Software developers can mitigate their software's security risk by measuring and reducing their software's attack surfaces. Our attack surface reduction approach complements the software industry's traditional code quality improvement approach for security risk mitigation and is useful in multiple phases of the software development lifecycle. Our collaboration with SAP demonstrates the use of our metric in the software development process.

634 citations

Proceedings ArticleDOI
Leyla Bilge1, Tudor Dumitras1
16 Oct 2012
TL;DR: This paper describes a method for automatically identifying zero-day attacks from field-gathered data that records when benign and malicious binaries are downloaded on 11 million real hosts around the world and identifies 18 vulnerabilities exploited before disclosure.
Abstract: Little is known about the duration and prevalence of zero-day attacks, which exploit vulnerabilities that have not been disclosed publicly. Knowledge of new vulnerabilities gives cyber criminals a free pass to attack any target of their choosing, while remaining undetected. Unfortunately, these serious threats are difficult to analyze, because, in general, data is not available until after an attack is discovered. Moreover, zero-day attacks are rare events that are unlikely to be observed in honeypots or in lab experiments.In this paper, we describe a method for automatically identifying zero-day attacks from field-gathered data that records when benign and malicious binaries are downloaded on 11 million real hosts around the world. Searching this data set for malicious files that exploit known vulnerabilities indicates which files appeared on the Internet before the corresponding vulnerabilities were disclosed. We identify 18 vulnerabilities exploited before disclosure, of which 11 were not previously known to have been employed in zero-day attacks. We also find that a typical zero-day attack lasts 312 days on average and that, after vulnerabilities are disclosed publicly, the volume of attacks exploiting them increases by up to 5 orders of magnitude.

534 citations


Authors

Showing all 2540 results

NameH-indexPapersCitations
James H. Brown12542372040
Kevin C. Jones11474450207
Mark D. Hill8126925078
Angelos D. Keromytis7138019448
Alexandros G. Dimakis6730722242
Tzi-cker Chiueh442409977
Sandeep K. Singhal441267273
Sukanta Saha419241724
Antonio Nucci401535078
Gianluca Stringhini381815702
Duen Horng Chau361814837
Kien A. Hua363077836
Kevin R. B. Butler341143458
Marc Dacier33864494
Andrew Gardner331774439
Network Information
Related Institutions (5)
Microsoft
86.9K papers, 4.1M citations

80% related

Google
39.8K papers, 2.1M citations

78% related

AT&T Labs
5.5K papers, 483.1K citations

78% related

Adobe Systems
8K papers, 214.7K citations

76% related

Performance
Metrics
No. of papers from the Institution in previous years
YearPapers
202159
2020105
2019164
201881
201763
2016119