Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Interesting. I would have thought that looking at system call traces is something that has been done before for malware detection though, am I wrong?


You are not wrong. The earliest one I'm aware of is Stephanie Forrest's work from 1997:

http://www.cs.unm.edu/~forrest/publications/int_decssc.pdf

Though she also had a couple papers in a similar vein starting in 1994.

However, Masters theses are often not completely novel, and it's sometimes worth repeating work from long ago to see what's changed as operating systems and malware have evolved.


Detection and mitigation. The authors of the paper linked by sibling post continued the work to create a sort of exponential denice-ing system in the early 2000s.

Source: student of one the co-authors, read the papers.




Consider applying for YC's Summer 2026 batch! Applications are open till May 4

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: