-
3
-
-
33751052185
-
Static detection of malicious code in executable programs
-
March
-
J. Bergeron, M. Debbabi, J. Desharnais, M. Erhioui, Y. Lavoie, and N. Tawbi. Static detection of malicious code in executable programs. Symposium on Requirements Engineering for Information Security (SREIS'01), March 2001.
-
(2001)
Symposium on Requirements Engineering for Information Security (SREIS'01)
-
-
Bergeron, J.1
Debbabi, M.2
Desharnais, J.3
Erhioui, M.4
Lavoie, Y.5
Tawbi, N.6
-
4
-
-
26444505656
-
Detection of malicious code in cots software: A short survey
-
March
-
J. Bergeron, M. Debbabi, J. Desharnais, B. Ktari, M. Salios, N. Tawbi, R. Charpentier, and M. Patry. Detection of malicious code in cots software: A short survey. First International Software Assurance Certification Conference (ISACC'99), March 1999.
-
(1999)
First International Software Assurance Certification Conference (ISACC'99)
-
-
Bergeron, J.1
Debbabi, M.2
Desharnais, J.3
Ktari, B.4
Salios, M.5
Tawbi, N.6
Charpentier, R.7
Patry, M.8
-
6
-
-
0030092390
-
Checking for race conditions in file accesses
-
M. Bishop and M. Dilger. Checking for race conditions in file accesses. Computing Systems, 9(2), 1996.
-
(1996)
Computing Systems
, vol.9
, Issue.2
-
-
Bishop, M.1
Dilger, M.2
-
14
-
-
27544433210
-
Semantic aware malware detection
-
May
-
M. Christodorescu, S. Jha, S. Seshia, D. Song, and R. Bryant. Semantic aware malware detection. In Proceedings of the 2005 IEEE Symposium on Security and Privacy, May 2005.
-
(2005)
Proceedings of the 2005 IEEE Symposium on Security and Privacy
-
-
Christodorescu, M.1
Jha, S.2
Seshia, S.3
Song, D.4
Bryant, R.5
-
15
-
-
27544477843
-
Netsky: A conflict starter?
-
May
-
M. Ciubotariu. Netsky: a conflict starter? Virus Bulletin, pages 4-8, May 2004.
-
(2004)
Virus Bulletin
, pp. 4-8
-
-
Ciubotariu, M.1
-
16
-
-
0023294949
-
Computer viruses: Theory and experiments
-
F. Cohen. Computer viruses: Theory and experiments. Computers and Security, 6:22-35, 1987.
-
(1987)
Computers and Security
, vol.6
, pp. 22-35
-
-
Cohen, F.1
-
18
-
-
0036704573
-
Watermarking, tamperproofing, and obfuscation - Tools for software protection
-
August
-
C. Collberg and C. Thomborson. Watermarking, tamperproofing, and obfuscation - tools for software protection. IEEE Transactions on Software Engineering, 28(8):735-746, August 2002.
-
(2002)
IEEE Transactions on Software Engineering
, vol.28
, Issue.8
, pp. 735-746
-
-
Collberg, C.1
Thomborson, C.2
-
19
-
-
0004046658
-
A taxonomy of obfuscating transformations
-
July
-
C. Collberg, C. Thomborson, and D. Low. A taxonomy of obfuscating transformations. Technical Report 148, Department of Computer Science, University of Auckland, July 1997.
-
(1997)
Technical Report 148, Department of Computer Science, University of Auckland
-
-
Collberg, C.1
Thomborson, C.2
Low, D.3
-
20
-
-
33751022720
-
-
Compuware Corporation. Technical Paper, September
-
Compuware Corporation. Debugging blue screens. Technical Paper, September 1999.
-
(1999)
Debugging Blue Screens
-
-
-
21
-
-
48349100150
-
Dynamic monitoring of malicious activity in software systems
-
March
-
M. Debbabi, M. Girard, L. Poulin, M. Salois, and N. Tawbi. Dynamic monitoring of malicious activity in software systems. Symposium on Requirements Engineering for Information Security (SREIS'01), March 2001.
-
(2001)
Symposium on Requirements Engineering for Information Security (SREIS'01)
-
-
Debbabi, M.1
Girard, M.2
Poulin, L.3
Salois, M.4
Tawbi, N.5
-
24
-
-
84861256922
-
Lessons from virus developers: The beagle worm history through april 24, 2004
-
May Last accessed 01 November 2005
-
J. Gordon. Lessons from virus developers: The beagle worm history through april 24, 2004. Security Focus, May 2004. Available online at URL http://downloads.securityfocus.com/library/BeagleLessons.pdf. Last accessed 01 November 2005.
-
(2004)
Security Focus
-
-
Gordon, J.1
-
25
-
-
33751030728
-
Ia-32 intel architecture software developers manual
-
Intel Corp.
-
Intel Corp. Ia-32 intel architecture software developers manual, vols 1-3. Intel Developers Guide, 2003.
-
(2003)
Intel Developers Guide
, vol.1-3
-
-
-
32
-
-
0029488806
-
Mcf: A malicious code filter
-
R. Lo, K. Levitt, and R. Olsson. Mcf: A malicious code filter. Computers and Society, 14(6):541-566, 1995.
-
(1995)
Computers and Society
, vol.14
, Issue.6
, pp. 541-566
-
-
Lo, R.1
Levitt, K.2
Olsson, R.3
-
34
-
-
31944440969
-
Pin: Building customized program analysis tools with dynamic instrumentation
-
C. Luk, R. Cohn, R. Muth, H. Patil, A. Klauser, G. Lowney, S. Wallace, V. J. Reddi, and K. Hazelwoo. Pin: Building customized program analysis tools with dynamic instrumentation. In ACM SIGPLAN Conference on Programming Language Design and Implementation, pages 190-200, 2005.
-
(2005)
ACM SIGPLAN Conference on Programming Language Design and Implementation
, pp. 190-200
-
-
Luk, C.1
Cohn, R.2
Muth, R.3
Patil, H.4
Klauser, A.5
Lowney, G.6
Wallace, S.7
Reddi, V.J.8
Hazelwoo, K.9
-
35
-
-
23744454494
-
Sobig.e - Evolution of the worm
-
Last accessed 01 November 2005
-
LURHQ. Sobig.e - evolution of the worm. Technical Report. LURHQ, 2003. Available online at URL http://www.lurhq.com/sobig-e.html. Last accessed 01 November 2005.
-
(2003)
Technical Report. LURHQ
-
-
-
37
-
-
33751061397
-
-
McAfee. W32/hiv. October. Last accessed 28 Oct. 2005
-
McAfee. W32/hiv. Virus Information Library, October 2000. Available online at URL http://vil-origin.nai.com/vil/. Last accessed 28 Oct. 2005.
-
(2000)
Virus Information Library
-
-
-
38
-
-
33751051932
-
-
McAfee. W32/mydoom@mm. Last accessed 28 Oct. 2005
-
McAfee. W32/mydoom@mm. Virus Information Library, 2004. Available online at URL http://vil-origin.nai.com/vil/. Last accessed 28 Oct. 2005.
-
(2004)
Virus Information Library
-
-
-
39
-
-
0034269416
-
Attacking malicious code: Report to the infosec research council
-
October
-
G. McGraw and G. Morrisett. Attacking malicious code: Report to the infosec research council. IEEE Software, 17(5):33-41, October 2000.
-
(2000)
IEEE Software
, vol.17
, Issue.5
, pp. 33-41
-
-
McGraw, G.1
Morrisett, G.2
-
41
-
-
0041475743
-
Software obfuscation on a theoretical basis and its implementation
-
T. Ogiso, Y. Sakabe, M. Soshi, and A. Miyaji. Software obfuscation on a theoretical basis and its implementation. IEICE Transactions on Fundamentals, E86-A(1), 2003.
-
(2003)
IEICE Transactions on Fundamentals
, vol.E86-A
, Issue.1
-
-
Ogiso, T.1
Sakabe, Y.2
Soshi, M.3
Miyaji, A.4
-
43
-
-
33751066337
-
Debugging windows based applications using windbg
-
J. Robbins. Debugging windows based applications using windbg. Miscrosoft Systems Journal, 1999.
-
(1999)
Miscrosoft Systems Journal
-
-
Robbins, J.1
-
44
-
-
84943385283
-
Reconfigurable and retargetable software dynamic translation
-
K. Scott, N. Kumar, S. Velusamy, B. Childers, J. Davidson, and M. Soffa. Reconfigurable and retargetable software dynamic translation. In 1st Conference on Code Generation and Optimization, pages 36-47, 2003.
-
(2003)
1st Conference on Code Generation and Optimization
, pp. 36-47
-
-
Scott, K.1
Kumar, N.2
Velusamy, S.3
Childers, B.4
Davidson, J.5
Soffa, M.6
-
45
-
-
0013135152
-
Analysis and detection of computer viruses and worms: An annotated bibliography
-
February
-
P. Singh and A. Lakhotia. Analysis and detection of computer viruses and worms: An annotated bibliography. ACM SIGPLAN Notices, 37(2):29-35, February 2002.
-
(2002)
ACM SIGPLAN Notices
, vol.37
, Issue.2
, pp. 29-35
-
-
Singh, P.1
Lakhotia, A.2
-
47
-
-
33751037764
-
-
Last Accessed: 28 October 2005
-
Symantec. Understanding and managing polymorphic viruses. Available online at URL http://www.symantec.com/avcenter/whitepapers.html. Last Accessed: 28 October 2005.
-
Understanding and Managing Polymorphic Viruses
-
-
-
49
-
-
33751025054
-
Bkdr.surila.g (w32/ratos)
-
August. Last accessed 28 Oct. 2005
-
TrendMicro. Bkdr.surila.g (w32/ratos). Virus Encyclopedia, August 2004. Available online at URL http://www.trendmicro.com/vinfo/virusencyclo/. Last accessed 28 Oct. 2005.
-
(2004)
Virus Encyclopedia
-
-
-
52
-
-
33751025884
-
Accelerate software development, testing and deployment with the vmware virtualization platform
-
VMWare Inc. June
-
VMWare Inc. Accelerate software development, testing and deployment with the vmware virtualization platform. Technical Report, VMWare Technology Network, June 2005.
-
(2005)
Technical Report, VMWare Technology Network
-
-
-
56
-
-
33751064002
-
Polymorphic viruses, implementation, detection and protection
-
Last accessed 28 Oct. 2005
-
T. Yetiser. Polymorphic viruses, implementation, detection and protection. VDS Advanced Research Group, P.O. Box 9393, Baltimore, MD 21228, USA. Available online at URL http://vx.netlux.org/lib/ayt01.html. Last accessed 28 Oct. 2005.
-
VDS Advanced Research Group, P.O. Box 9393, Baltimore, MD 21228, USA
-
-
Yetiser, T.1
|