Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Jeffrey Wilhelm is active.

Publication


Featured researches published by Jeffrey Wilhelm.


recent advances in intrusion detection | 2007

A forced sampled execution approach to kernel rootkit identification

Jeffrey Wilhelm; Tzi-cker Chiueh

Kernel rootkits are considered one of the most dangerous forms of malware because they reside inside the kernel and can perform the most privileged operations on the compromised machine. Most existing kernel rootkit detection techniques attempt to detect the existence of kernel rootkits, but cannot do much about removing them, other than booting the victim machine from a clean operating system image and configuration. This paper describes the design, implementation and evaluation of a kernel rootkit identification system for the Windows platform called Limbo, which prevents kernel rootkits from entering the kernel by checking the legitimacy of every kernel driver before it is loaded into the operating system. Limbo determines whether a kernel driver is a kernel rootkit based on its binary contents and run-time behavior. To expose the execution behavior of a kernel driver under test, Limbo features a forced sampled execution approach to traverse the drivers control flow graph. Through a comprehensive characterization study of current kernel rootkits, we derive a set of run-time features that can best distinguish between legitimate and malicious kernel drivers. Applying a Naive Bayes classification algorithm on this chosen feature set, the first Limbo prototype is able to achieve 96.2% accuracy for a test set of 754 kernel drivers, 311 of which are kernel rootkits.


Archive | 2005

Detecting polymorphic threats

Carey Nachenberg; Jeffrey Wilhelm


Archive | 2011

Polonium: Tera-Scale Graph Mining and Inference for Malware Detection

Duen Horng; Polo Chau; Carey Nachenberg; Jeffrey Wilhelm; Christos Faloutsos


Archive | 2011

Techniques for behavior based malware analysis

Sandeep Bhatkar; Susanta Nanda; Jeffrey Wilhelm


Archive | 2013

Polonium: Tera-Scale Graph Mining for Malware Detection

Duen Horng Chau; Carey Nachenberg; Jeffrey Wilhelm; Adam Wright; Christos Faloutsos


Archive | 2009

Efficient signature packing for an intrusion detection system

Jeffrey Wilhelm


Archive | 2006

API-profile guided unpacking

Jeffrey Wilhelm


Archive | 2006

Method and apparatus for detecting leakage of sensitive information

Jeffrey Wilhelm; Carey Nachenberg


Archive | 2005

Determining origins of queries for a database intrusion detection system

Adam Bromwich; Jeffrey Wilhelm


Archive | 2012

Systems and methods for using acquisitional contexts to prevent false-positive malware classifications

Joseph Chen; Jeffrey Wilhelm

Collaboration


Dive into the Jeffrey Wilhelm's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Duen Horng Chau

Georgia Institute of Technology

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge