-
1
-
-
34047166855
-
Using Code Normalization for Fighting Self-Mutating Malware
-
Arlington, VA
-
Brushi, D., Martignoni, L., and Monga, M. Using Code Normalization for Fighting Self-Mutating Malware. In Proceedings of the International Symposium of Secure Software Engineering (Arlington, VA, 2006).
-
(2006)
Proceedings of the International Symposium of Secure Software Engineering
-
-
Brushi, D.1
Martignoni, L.2
Monga, M.3
-
2
-
-
34547189367
-
-
Chess, D. M., and White, S. R. An Undetectable Computer Virus. In Proceedings of Virus Bulletin Conference (2000).
-
Chess, D. M., and White, S. R. An Undetectable Computer Virus. In Proceedings of Virus Bulletin Conference (2000).
-
-
-
-
3
-
-
0024682488
-
Computational Aspects of Computer Viruses
-
Cohen, F. Computational Aspects of Computer Viruses. Computers & Security, 8 (1989), 325-344.
-
(1989)
Computers & Security
, vol.8
, pp. 325-344
-
-
Cohen, F.1
-
4
-
-
27544433210
-
Semantics-Aware Malware Detection
-
Oakland, CA, USA, May 8-11
-
Christodorescu, M., Jha, S., Seshia, S. A., Song, D., and Bryant, R. E. Semantics-Aware Malware Detection. In Proceedings of the 2005 IEEE Symposium on Security and Privacy (S&P'05) (Oakland, CA, USA, May 8-11, 2005)
-
(2005)
Proceedings of the 2005 IEEE Symposium on Security and Privacy (S&P'05)
-
-
Christodorescu, M.1
Jha, S.2
Seshia, S.A.3
Song, D.4
Bryant, R.E.5
-
5
-
-
33746882464
-
Mal ware Phytogeny Generation using Permutations of Code
-
Nov
-
Karim, M. E., Walenstein, A., Lakhotia, A.,and Parida, L. Mal ware Phytogeny Generation using Permutations of Code. European Research Journal of Computer Virology 1, 1-2 (Nov. 2005) 13-23.
-
(2005)
European Research Journal of Computer Virology
, vol.1
, Issue.1-2
, pp. 13-23
-
-
Karim, M.E.1
Walenstein, A.2
Lakhotia, A.3
Parida, L.4
-
6
-
-
1842441772
-
Authorship Analysis: Identifying The Author of a Program
-
Technical Report 96-052
-
Krsul, I., Spafford, E. H. Authorship Analysis: Identifying The Author of a Program. Technical Report 96-052, 1996.
-
(1996)
-
-
Krsul, I.1
Spafford, E.H.2
-
7
-
-
33746389292
-
Polymorphic Worm Detection Using Structural Information of Executables
-
Seattle, WA, USA, September 7-9
-
th Symposium on Recent Advances in Intrusion Detection (RAID) (Seattle, WA, USA, September 7-9, 2005).
-
(2005)
th Symposium on Recent Advances in Intrusion Detection (RAID)
-
-
Kruegel, C.1
Kirda, E.2
Mutz, D.3
Robertson, W.4
Vigna, G.5
-
8
-
-
0037269111
-
Reliable Identification of Bounded-Length Viruses is NP-Complete
-
Spinellis, D. Reliable Identification of Bounded-Length Viruses is NP-Complete. IEEE Transactions on Information Theory, 49, 1 (2003), 280-284.
-
(2003)
IEEE Transactions on Information Theory
, vol.49
, Issue.1
, pp. 280-284
-
-
Spinellis, D.1
-
10
-
-
34547197548
-
Normalizing Metamorphic Malware Using Term Rewriting
-
Sheraton Society Hill, Philadelphia, PA, USA
-
Walenstein, A., Mathur, R., Chouchane, M. R., and Lakhotia, A. Normalizing Metamorphic Malware Using Term Rewriting. In Proceedings of the Sixth IEEE International Workshop on Source Code Analysis and Manipulation (SCAM 2006) (Sheraton Society Hill, Philadelphia, PA, USA, 2006).
-
(2006)
Proceedings of the Sixth IEEE International Workshop on Source Code Analysis and Manipulation (SCAM 2006)
-
-
Walenstein, A.1
Mathur, R.2
Chouchane, M.R.3
Lakhotia, A.4
|