In-Cloud Malware Analysis and Detection

In-Cloud Malware Analysis and Detection: State of the Art
Shahid Alam
Ibrahim Sogukpinar
University of Victoria
Victoria, BC, V8P5C2, Canada
Gebze Institute of Technology
41400, Gebze, Kocaeli, Turkey
[email protected]
Issa Traore
University of Victoria
Victoria, BC, V8P5C2, Canada
[email protected]
ABSTRACT
With the advent of Internet of Things, we are facing another wave of malware attacks, that encompass intelligent
embedded devices. Because of the limited energy resources,
running a complete malware detector on these devices is
quite challenging. There is a need to devise new techniques
to detect malware on these devices. Malware detection is
one of the services that can be provided as an in-cloud service. This paper reviews current such systems, discusses
there pros and cons, and recommends an improved in-cloud
malware analysis and detection system. We introduce a new
three layered hybrid system with a lightweight antimalware
engine. These features can provide faster malware detection
response time, shield the client from malware and reduce
the bandwidth between the client and the cloud, compared
to other such systems. The paper serves as a motivation for
improving the current and developing new techniques for
in-cloud malware analysis and detection system.
Categories and Subject Descriptors
D.4.6 [Operating Systems]: Security and Protection—Invasive software; C.2.4 [Computer-Communication Networks]: Distributed Systems—Distributed applications
General Terms
Security, Malware
[email protected]
Yvonne Coady
University of Victoria
Victoria, BC, V8P5C2, Canada
[email protected]
devices, such as smart phones, tablets, routers, switches,
modern SCADA (supervisory control and data acquisition),
PLC (programmable logic controllers) and EPOS (electronic
point of sale) and automotive systems, home devices (scanners, printers, toasters and refrigerators), and medical devices, etc.
These devices are becoming more sophisticated with more
memory and CPU power. That means like others, these devices are also prone to more sophisticated malware (such as
polymorphic and metamorphic) attacks. Because of their
limited energy resources, currently there is a limit to grow
the memory size and CPU power (but is enough to launch a
sophisticated malware attack, such as Stuxnet [6]) on these
devices. Therefore, running a complete malware detector on
these devices if not impossible is quite challenging. There
is a need to devise other techniques to protect, and detect
malware on these devices. Such new techniques can take
advantage of distributed malware detection in a cloud computing environment using multiple detection engines.
Recently, researchers in academia and industry have started
studying and examining the use of cloud for malware analysis and detection. This paper reviews current such systems,
discusses there pros and cons, and recommends an improved
in-cloud malware analysis and detection system. We introduce a new three layered hybrid system with a lightweight
antimalware engine. These features can provide faster malware detection response time, shield the client from malware
and reduce the bandwidth between the client and the cloud,
compared to other such systems.
Keywords
Cloud computing, In-cloud services, Malware analysis, Malware detection
1.
INTRODUCTION
With the advent of Internet of Things [23], we are facing another wave of malware attacks, that encompass intelligent
Permission to make digital or hard copies of all or part of this work for
personal or classroom use is granted without fee provided that copies are not
made or distributed for profit or commercial advantage and that copies bear
this notice and the full citation on the first page. Copyrights for components
of this work owned by others than ACM must be honored. Abstracting with
credit is permitted. To copy otherwise, or republish, to post on servers or to
redistribute to lists, requires prior specific permission and/or a fee. Request
permissions from [email protected].
SIN’14, September 9 - 11, 2014, Glasgow, Scotland, UK
c 2014 ACM 978-1-4503-3033-6/14/09 ...$15.00.
Copyright http://dx.doi.org/10.1145/2659651.2659730
1.1
Cloud Computing
Cloud computing is an environment where a program or
application runs on a number of computers connected
through a communication network. Any user (client) who
has permission to access the cloud can perform different
tasks using the cloud, such as running applications and
storing data, etc. These tasks may run on one computer
or many connected computers at the same time. These
computers can be physical or virtual. One physical server
may be running multiple independent virtual servers, each
appearing to the user as one physical device. These virtual
servers are disassociated from the physical server, hence
can move around and scale up and down on the fly without
affecting the client.
Some of the advantages of cloud computing are on-demand
self service, broad network access, resource pooling, rapid
elasticity and measured service [15]. Despite these advantages, there are some disadvantages, such as, network
connectivity and downtime, lack of security and privacy
in the cloud, limited control and increased vulnerability.
Giving all the information to a third party (the cloud host
company) may put the data on risk. Large companies may
afford a private cloud, but smaller companies may have
to rely on a third party cloud service provider. Such a
company has to make sure the service provider is reliable
and will keep their information secure.
Recently, CodeSpaces, a source code hosting platform that
enables development and collaboration for software teams,
is shut down because of a distributed denial-of-service
(DDoS) attack on its servers hosted in Amazon EC2
cloud [16]. In our opinion for the cloud computing to
become ubiquitous, it needs to provide more security,
trust and privacy to its clients [7, 24]. Security is still the
top inhibitor for cloud computing, but the concern over
security is declining year-over-year. In a 2013 survey of 855
respondents on the future of cloud computing, including
business users, IT decision makers and cloud vendors, 46%
listed security as their number one concern, compared to
55% the last year [25].
The word in-cloud used in this paper refers to the services
provided by a cloud to it’s users, such as Software as a Service (SaaS), Platform as a Service (PaaS) and Infrastructure
as a Service (IaaS) [15]. Malware analysis and detection
is one of the services that can be provided as an in-cloud
service. Companies like Panda Security [22] have already
started providing such a service.
2.
STATE OF THE ART
This Section discusses the previous research efforts for
in-cloud malware analysis and detection, and compares
them with the system proposed in this paper. We only
discuss academic research efforts, because we are not able to
find any public documents for the only commercial in-cloud
malware analysis and detection system [22]. We also did
not include patents filed for such systems [5]. Our focus is
on a complete in-cloud malware detection system (client
and the cloud), so we do not cover research efforts that
only investigate in-cloud services for malware detection.
Interested readers are referred to [8, 13, 14, 21] for cloudbased malware detection, that may have the potential to be
used in a complete in-cloud malware analysis and detection
system.
Oberheide et al. [17, 18] make a case and propose an
architecture to use the Cloud for malware analysis and
detection. The system proposed combines multiple antimalware engines in a cloud, and move the malware detection
from the clients to the cloud. The proposed system is called
CloudAV and consists of three components. The first component is the client software, an agent on the client to send
new files to the cloud for analysis. The second component
is the network service, that receives files, analyses them
using multiple antimalware engines and sends the report
back to the client. The third component is the archival
and forensic service, a database of analysed files. CloudAV
has also been extended for mobile devices [19], to reduce
on-device resource consumption and software complexity.
A mobile agent is developed to interface with the CloudAV
network service. A mobile specific behavioral engine is also
added to detect malware. By migrating security services
to cloud-based malware analysis and detection service,
CloudAV provides enhanced protection capabilities to the
client. The system proposed in this paper, in addition to
providing all the components of CloudAV, also adds a LWE
(lightweight antimalware engine), that can further reduce
the malware detection response time.
Martignoni et al. [12] propose a behavior-based malware
analysis framework in the cloud that allows the users to
send a file to the cloud to be executed and analyse for
malware detection. The file is executed on the client. The
cloud simulates the execution by using the output produced
by the file executed on the client. This way the cloud is able
to fully (in an accurate way) simulate the execution of the
file. Multiple execution instances of the cloud component,
executing the same file, are run. Each of these instances
use different execution environment, to see how each
environment affects the behavior of the malware. Results
of these analysis are correlated to produce the final result.
The problem with this approach is the use of bandwidth
resources. Part of the program will not be running locally
but on the network, and depending on the number of calls
made to the client, can consume considerable amount of
the available bandwidth. Running a part of the malware
on the client can expose the client to the malware, and will
still require an intelligent monitoring on the end host. The
system proposed in this paper separates the execution of
the file (dynamic analysis) under detection from the client,
by running it either inside a LWE or antimalware engines.
Portokalidis et al. [20] propose, running a replica of the
phone (android) on a security server in a cloud. A tracer
on the phone records all information needed to replay
the application. This trace is send to the cloud over an
encrypted channel. A replayer on the cloud executes the
application within an emulator. The trace transmission is
synchronized using a loose model. That is, the synchronization is done only when the device is awake and connected
to the internet or when it is recharging. They use dynamic
taint analysis (DTA) on the replica running on the cloud.
DTA is very expensive and impractical for smartphones,
hence more powerful hardware of cloud is used for DTA.
The application needs to be run on the phone and then
a complete trace is transmitted to the cloud, therefore it
suffers the same problems as mentioned above of bandwidth
and exposing the client to malware.
Liu et al. [10, 11] propose an approach to correlate
retrospective malware detection results for the detection
of malware attacks. The approach is implemented on
Hadoop, an open source cloud computing platform, and
is based on PE (portable executable) file format. Each
client has a monitoring agent that monitors the PE file
created/written logs and send them to a server in the cloud.
These logs are used to build a relationship among PE files,
and these relations are then used to capture the changes.
A file is represented by three attributes, it’s hash, name
and size, called file attribute vector. Changes in these
attributes mean a change in the file. A change in the file
can be suspicious, and can be used to detect the presence
of a malware. A user of this system can query it to find
suspicious files. There are two different type of queries; one
using file attributes and the other using file relations. This
system only detect if the file is suspicious or not, therefore
the system itself cannot be used for malware detection
but can be integrated with a complete malware detection
system.
Jarabek et al. [9] propose a lightweight antimalware called
ThinAV for android that use third party online (in-cloud)
malware scanning services.
ThinAV uses Kaspersky,
VirusChief, VirusTotal, and ComDroid. All these services
are freely available to public. ThinAV uses there publically
available APIs to interface with them. The paper also
discusses the performance of these four engines. ThinAV
has two main components, the client and the server. The
client submits applications for scanning and the server
submits received files to the third party scanning services.
ThinAV is a good example of a client using free in-cloud
malware analysis and detection services.
Zonouz et al. [27] propose a cloud-based framework for
smartphones malware detection, named Secloud.
The
prototype framework is implemented for Android. A client
agent resides on the smartphone and an emulator on the
cloud. The client agent collects user and sensor input from
the device and send it to the Secloud’s emulator. It also
listens to the notifications from the Secloud’s emulator
and performs the requested actions. The emulator runs
an emulated replica of the registered device and keeps it
synchronized with the device. The emulation environment
runs third party security solutions for malware detection.
Once a misbehavior is detected, the emulator sends a
notification to the client agent on the device to take the
required actions. This approach is similar to [20]. In [20]
replaying everything incurs a high overhead traffic, whereas
in Secloud, only device input is logged, communicated and
replayed in the replica. The application needs to be run on
the phone before inputs are captured and sent to the cloud,
therefore it suffers the same problems as mentioned above
of bandwidth and exposing the client to malware.
Barakat et al. [4] use cloud computing to support and
enhance the malware analysis process. They used Cuckoo
Sandbox, a behavior analysis antimalware engine for
malware analysis, and used CloudStack, an open source
cloud-based environment written in java, for providing the
cloud service model. Cuckoo Sandbox was modified to work
in the cloud. The paper is a good introduction of how
to setup such an environment for malware analysis and
detection. Two systems were implemented and compared,
one with cloud and other without cloud. Same settings
were used on both systems. Cloud-based system was
faster compared to the stand-alone system. Initially the
stand-alone system was faster but after 100 samples the
cloud-based system performed better. Overall time saved,
after 100 samples, on average was 22.93%. The timing
results show that despite using the cloud the time, for a
dataset of 100 – 3000 malware samples, ranges from 1985 –
62621 seconds. These timings can be improved by efficient
use of the cloud by the antimalware engine and also using a
LWE as proposed in this paper. That is where the Cuckoo
sandbox lacked. It can be improved by running VM sessions
in parallel, and parallelizing other parts of the antimalware
engine as done in [2].
Zhang et al. [26] propose a technique similar to CloudAV.
The authors use the following multiple engines in the cloud
to detect malware. Threat expert, CW sandbox, Anubis,
Joe sandbox and Cuckoo sandbox. According to the results
presented in the paper the detection rate of each engine is
very low. The authors claim that combining them will improve the detection rate, but the results for the combined
detection rate are not presented in the paper.
3.
DISCUSSION
It is difficult to detect new generation of malware, such as
polymorphic and metamorphic malware, in an in-cloud malware analysis and detection system. To detect these malware
antimalware software uses behavioral detection techniques,
that are closely tied to the system/environment (local running processes and threads etc) they are running on. It is
difficult to provide such environment inside a cloud.
A cloud can use virtual machines to replicate the client
local system. To replicate a system fully, it needs to be
replayed deterministically in the cloud. Concurrency and
interprocess communication in an application can cause
nondeterminism, while replaying such an application.
Access to threads needs to be serialised for deterministic replay, but this can miss some of the exceptions
thrown when in the original (non-serialised) application
two or more threads access an object at the same time.
A malware may be hidden at this location (exception)
in the application. In this case the replay will miss
detecting this malware. Moreover, replicating each different system fully is not practical and may consume lot of
network bandwidth, the client computing power and energy.
Cloud computing is still immature and there are no standard APIs used by the cloud vendors, so most of the cloud
users have to re-write applications, when they switch cloud
platforms. Therefore, in most cases, an antimalware engine
will have to be re-written (the part that communicates
with the cloud) if moved to another cloud. This problem
will solve itself when the cloud users start demanding
standardization and interoperability.
Based on the discussion above and the review presented in
Section 2 we list some of the pros and cons of state of the
art in-cloud malware analysis and detection system.
3.1
Pros
1. The system decreases the complexity of the monitoring
software on the client.
2. The system Improves detection rate by combining multiple antimalware engines.
3. The system is extensible. Other antimalware engines
can be easily added.
4. The system is easy to deploy. Updating of the malware signatures is centralised. Instead of updating
signatures on each client, a single signature update is
required.
Cloud
Cloud
Antimalware engines
Antimalware engines
Report
e1
e2
e3
.
.
.
.
.
.
Report
em
e1
Client
e2
e3
.
.
.
.
.
em
Client
Malware signatures
File
.
Signature
s1 s2
Malware signatures
File
s3 sk
Signature
s1 s2
LWA
s3 sk
LWA
Suspicious file
Suspicious file
Suspicious file
Signature
LWE
LWE
Suspicious file
Signature
Report
LWA = Light weight agent
LWE = Light weight antimalware engine
LWA = Light weight agent
LWE = Light weight antimalware engine
Disassembler
(a) Lightweight antimalware
engine located in-cloud
Disassembler
(b) Lightweight antimalware
engine located in-client
Figure 1: An overview of the hybrid in-cloud layered malware analysis and detection system
5. The system provides deep malware analysis, such as
dynamic analysis, for resource constrained devices.
6. The system provides correlation of information between antimalware engines, such as sharing the behavior of a malware file, that can enhance the malware
detection.
3.2
Cons
1. The system increases the false positive rate. More antimalware engines can produce more false positives.
2. The system’s malware detection response time can increase, compared to using a single antimalware engine
on the client.
3. The system requires the development of an intelligent
agent on the client that can monitor and filter different
types of files and data.
4. Running a file on the client and then replicating on the
cloud, can expose the client to a possible malware.
5. Replicating each different client system fully on the
cloud is not practical and may consume lot of network
bandwidth, the client computing power and energy.
6. Without full replication of the client on the cloud, the
system makes it difficult to detect new generation of
malware, such as polymorphic and metamorphic malware.
7. The system is highly dependent on the availability of
the cloud and network connectivity. If the cloud is not
available, it can delay the detection.
8. The system is highly dependent on the trust and privacy provided by the cloud. Will the user trust the
cloud that she/he is sending the file to analyse and
detect using multiple antimalware engines? Morevoer,
the user may not trust some of the third party antimalware engines hosted on the cloud.
9. The system requires license from each vendor of the
antimalware engine.
4.
PROPOSED SOLUTION
Cloud computing have the potential to be used for malware
detection for intelligent devices, that do not have the resources to run a sophisticated malware detector. We call
such a system distributed malware detection system. As discussed above, there are still lot of challenges and impediments to using an in-cloud malware analysis and detection
system. We need to mitigate these effects before such a system becomes a reality.
There are different possibilities and combinations of using a
cloud for malware analysis and detection. Static analysis is
more suitable for real-time malware detection than dynamic
analysis. For a complete malware analysis and detection
system, a combination of these two techniques are used, and
is called a hybrid system. This paper focuses more on a
hybrid system, because it is more suitable for in-cloud based
malware analysis and detection.
We call an antimalware engine, lightweight, if it provides
real-time malware analysis and detection on resource constrained devices, such as notebooks, smart phones, tablets,
and other high end devices. Currently these devices have
upto 2-core processors (except few notebooks that have 4core processors) and can have at least a memory of size 2 GB
or more. Other devices, such as home devices and medical
devices, with comparatively less resources, may not be able
to run such a lightweight antimalware engine (LWE). The
LWE normally employs simple, or some sophisticated, static
analysis techniques. For some examples of such a LWE,
readers are referred to [1, 2, 3].
Figure 1 gives an overview of the hybrid in-cloud layered
malware analysis and detection system proposed in this paper. There are two new features that make this system different from other such systems. The use of three layers for
malware analysis and detection, and the LWE as described
above. The three layers are, the lightweight agent (LWA),
the LWE and the set of antimalware engines. The LWA is
normally a file scanner but can also act as a lightweight detector based on simple signature based techniques. The antimalware engine employ more sophisticated malware analysis and detection techniques (static, dynamic or hybrid),
and hence requires more resources than the LWE.
The client, can run either a LWA or a LWE depending on
the resources available, that can scan/detect files and send
only a suspicious file to the cloud for further analysis and
detection. The cloud can run multiple malware detection
engines to analyse the file, shown as e1 , e2 , e3 . . . . . em in
Figure 1, where m is the number of antimalware engines currently available in the cloud. These antimalware engines can
be developed in-house or licensed from antimalware vendors.
If the file is a malware an appropriate action (quarantined,
repaired, erased) is taken and the device is informed. If the
file is benign an appropriate message is sent back to the device. After a new malware is found its signature s is stored
in the database of malware signatures, shown as s1 , s2 , s3 .
. . . . sk in Figure 1, where k is the current number of malware signatures in the database. This database of malware
signatures is shared among the antimalware engines and the
LWE.
It is difficult for a static analysis tool to support different
platforms. A client in general will have a different platform
than a cloud server, and this makes porting an in-cloud LWE
to the client non-trivial. We use the techniques proposed in
[1, 2] to make the LWE portable. Therefore, the LWE can be
located in the cloud or the client. This portability of LWE
makes this system optimizable for different devices. In case
of a client, e.g, a resource constrained device, that cannot
afford to run a LWE, the engine can be moved to the cloud.
The LWE can be run as a proxy server inside the cloud, so
that all the resource constrained clients in the subnet have
only one LWE. Most cloud-based systems have their own
web proxies (for providing content filtering, SSL inspection
and malware protection, etc), that can be used to host the
LWE for such purposes.
The in-cloud antimalware engines are only used if the LWE
fails to detect the file as a malware, i.e, the file is still
suspicious (either benign or malware). The successful use
of the LWE (i.e, it detects the malware) can considerably
reduce the response time of malware detection. As the
technology improves, the devices become more complex
with more memory and CPU power. To keep pace with this
increase in the resources, the LWE can be updated with
more sophisticated antimalware engine.
The LWE with its characteristics mentioned above has the
potential to provide a faster malware detection response
time for an in-cloud system, compared to other such systems
discussed in Section 2. Creating the following layers, LWA,
LWE and antimalware engines, separates the execution of
the file (dynamic analysis) under detection from the client.
This in addition to shielding the client from the malware,
also helps in reducing the bandwidth required, compared to
some other such systems discussed in Section 2.
4.1
Summary
The system proposed in this paper and presented in Figure
1 mitigates, to a certain extent, some of the problems (1 –
6) mentioned in Section 3.2.
The LWE in the proposed system mitigates the effect of the
problems 2, 3, 4 and 5 by providing a lightweight antimalware engine that can be located in-cloud or in-client, and
hence provides a faster malware detection response time.
This portability of LWE also provides more accurate malware detection for polymorphic and metamorphic malware
by running in-client real-time malware analysis [1, 2], and
in some cases (where in-client LWE detects the malware)
eliminates the need for replicating the client system on the
cloud, hence reducing the bandwidth required. To separate
the execution from the client, the in-client LWE does not
run the suspicious application for malware analysis and detection (i.e, malware detection in the in-client LWE is based
on static analysis). This action (running the suspicious application, i.e, dynamic analysis) is only carried out by either
the in-cloud LWE or the antimalware engines hosted in the
cloud, and hence shields the client from the malware.
In addition to using the correlation of results from the antimalware engines to reduce the false positives, the system
proposed with the LWE helps mitigate to a certain extent
(where in-client or in-cloud LWE detects the malware) the
effect of increased false positives (problem 1).
5.
CONCLUSION
Malware detection is one of the services that can be provided
as an in-cloud service. In this paper we have reviewed current such systems and discussed there pros and cons. The
paper not only serves as a collection of recent references and
information for easy comparison and analysis, but also as
a motivation for improving the current and developing new
techniques for in-cloud malware analysis and detection system. We have recommended an improved in-cloud malware
analysis and detection system, by introducing a new three
layered hybrid system with a lightweight antimalware engine. These features can provide faster malware detection
response time, shield the client from malware and reduce
the bandwidth between the client and the cloud.
Currently we are implementing the hybrid in-cloud layered
malware analysis and detection system proposed in this paper. To take advantage of the distributed nature of a cloud,
we are also planning to parallelize different components of
the system. In the future we will carry out an empirical
evaluation of the system, by measuring and comparing, the
performance of the system on a cloud with the performance
of the system on a stand alone server.
References
[1] Shahid Alam, R. Nigel Horspool, and Issa Traore.
MAIL: Malware Analysis Intermediate Language - A
Step Towards Automating and Optimizing Malware
Detection. In Security of Information and Networks,
SIN ’13, New York, NY, USA, November 2013. ACM
SIGSAC.
[2] Shahid Alam, R. Nigel Horspool, and Issa Traore.
MARD: A Framework for Metamorphic Malware Analysis and Real-Time Detection. In Advanced Information
Networking and Applications, Research Track – Security and Privacy, AINA ’14, Washington, DC, USA,
May 2014. IEEE Computer Society.
[3] Shahid Alam, Ibrahim Sogukpinar, R. Nigel Horspool,
and Issa Traore. Sliding Window of Difference and Control Flow Weight for Metamorphic Malware Detection.
Journal of Computer Virology and Hacking Techniques,
in print, 2014.
[4] OsamahL. Barakat, ShaifulJ. Hashim, RajaSyamsulAzmirB. Raja Abdullah, AbdulRahman Ramli, Fazirulhisyam Hashim, Khairulmizam Samsudin, and Mah-
mud Ab Rahman. Malware analysis performance enhancement using cloud computing. Journal of Computer Virology and Hacking Techniques, 10(1):1–10,
2014.
[16] Stephanie Mlot. CodeSpaces.com closed its doors this
week, following a 12-hour security breach that completely wiped its servers.
http://www.pcmag.com/
article2/0,2817,2459765,00.asp, June 2014.
[5] Igor Barash, Gary Guseinov, Achal S Khetarpal, Bing
Liu, and Serge Zilber. Systems and methods for operating an anti-malware network on a cloud computing
platform, June 29 2010. US Patent App. 12/826,583.
[17] Jon Oberheide, Evan Cooke, and Farnam Jahanian. Rethinking antivirus: Executable analysis in the network
cloud. In 2nd USENIX Workshop on Hot Topics in
Security (HotSec 2007), 2007.
[6] Critical Infrastructure Protection M Edwards. An analysis of a cyberattack on a nuclear plant: The stuxnet
worm. Critical Infrastructure Protection, 116:59, 2014.
[18] Jon Oberheide, Evan Cooke, and Farnam Jahanian.
CloudAV: N-Version Antivirus in the Network Cloud.
In USENIX Security Symposium, pages 91–106, 2008.
[7] Diogo AB Fernandes, Liliana FB Soares, João V
Gomes, Mário M Freire, and Pedro RM Inácio. Security issues in cloud environments: a survey. International Journal of Information Security, 13(2):113–170,
2014.
[8] Keith Harrison, Behzad Bordbar, Syed TT Ali, Chris I
Dalton, and Andrew Norman. A framework for detecting malware in cloud by identifying symptoms. In
Enterprise Distributed Object Computing Conference
(EDOC), 2012 IEEE 16th International, pages 164–
172. IEEE, 2012.
[9] Chris Jarabek, David Barrera, and John Aycock.
Thinav: truly lightweight mobile cloud-based antimalware. In Proceedings of the 28th Annual Computer Security Applications Conference, pages 209–218.
ACM, 2012.
[10] Shun-Te Liu and Yi-Ming Chen. Retrospective detection of malware attacks by cloud computing. In Proceedings of the 2010 International Conference on CyberEnabled Distributed Computing and Knowledge Discovery, CYBERC ’10, pages 510–517, Washington, DC,
USA, 2010. IEEE Computer Society.
[11] Shun-Te Liu and Yi-Ming Chen. Retrospective detection of malware attacks by cloud computing. International Journal of Information Technology, Communications and Convergence, 1(3):280–296, 2011.
[12] Lorenzo Martignoni, Roberto Paleari, and Danilo Bruschi. A framework for behavior-based malware analysis in the cloud. In Information Systems Security, pages
178–192. Springer, 2009.
[13] C.A. Martinez, G.I. Echeverri, and A.G.C. Sanz. Malware detection based on cloud computing integrating
intrusion ontology representation. In Communications
(LATINCOM), 2010 IEEE Latin-American Conference
on, pages 1–6, Sept 2010.
[14] Mohammad M Masud, Tahseen M Al-Khateeb,
Kevin W Hamlen, Jing Gao, Latifur Khan, Jiawei Han,
and Bhavani Thuraisingham. Cloud-based malware detection for evolving data streams. ACM Transactions
on Management Information Systems (TMIS), 2(3):16,
2011.
[15] Peter Mell and Timothy Grance. The NIST Definition
of Cloud Computing. Special Publication 800-145, 2011.
[19] Jon Oberheide, Kaushik Veeraraghavan, Evan Cooke,
Jason Flinn, and Farnam Jahanian. Virtualized incloud security services for mobile devices. In Proceedings of the First Workshop on Virtualization in Mobile
Computing, pages 31–35. ACM, 2008.
[20] Georgios Portokalidis, Philip Homburg, Kostas Anagnostakis, and Herbert Bos. Paranoid Android: Versatile Protection for Smartphones. In Proceedings of
the 26th Annual Computer Security Applications Conference, ACSAC ’10, pages 347–356, New York, NY,
USA, 2010. ACM.
[21] Matthias Schmidt, Lars Baumgartner, Pablo Graubner,
David Bock, and Bernd Freisleben. Malware detection
and kernel rootkit prevention in cloud computing environments. In Parallel, Distributed and Network-Based
Processing (PDP), 2011 19th Euromicro International
Conference on, pages 603–610. IEEE, 2011.
[22] Panda Security. From Traditional Antivirus to Collective Intelligence (2007). http://www.pandasecurity.
com/usa/enterprise/downloads/docs/product/
whitepapers/02dwn_wp_antivirus_evolution.pdf,
Last accessed: August 4, 2014.
[23] Antonio Skarmeta and M.Victoria Moreno. Internet of
Things. In Willem Jonker and Milan Petkovi?, editors,
Secure Data Management, pages 48–53. Springer International Publishing, 2014.
[24] Subashini Subashini and V Kavitha. A survey on security issues in service delivery models of cloud computing. Journal of Network and Computer Applications,
34(1):1–11, 2011.
[25] North Bridge Venture Partners. 2013 Future of Cloud
Computing 3rd Annual Survey Results. http://www.
nbvp.com/2013-cloud-computing-survey, Last accessed: August 4, 2014.
[26] Zhenyu Zhang, Wujun Zhang, Jianfeng Wang, and Xiaofeng Chen. An Effective Cloud-Based Active Defense
System against Malicious Codes. In Information and
Communication Technology, pages 690–695. Springer,
2014.
[27] Saman Zonouz, Amir Houmansadr, Robin Berthier,
Nikita Borisov, and William Sanders. Secloud: A cloudbased comprehensive and lightweight security solution
for smartphones. Computers & Security, 37:215–227,
2013.