Title :
The Next Malware Battleground: Recovery After Unknown Infection
Author_Institution :
Georgia Inst. of Technol., Atlanta, GA, USA
Abstract :
For more than two decades, attackers and malware authors have battled defensive users and administrators for control of computing resources. Unfortunately, the defenders aren´t winning the fight. Systems infected with malicious code are as widespread.
Keywords :
invasive software; computing resources control; defensive users; malware; Military computing; bot; botnet; malware; recovery; remediation; security;
Journal_Title :
Security & Privacy, IEEE
DOI :
10.1109/MSP.2010.107