-
1
-
-
34547141391
-
The Nepenthes Platform: An Efficient Approach To Collect Malware
-
P. Baecher, M. Koetter, T. Holz, M. Dornseif, and F. Freiling. The Nepenthes Platform: An Efficient Approach To Collect Malware. In Recent Advances in Intrusion Detection (RAID), 2006.
-
(2006)
Recent Advances in Intrusion Detection (RAID)
-
-
Baecher, P.1
Koetter, M.2
Holz, T.3
Dornseif, M.4
Freiling, F.5
-
5
-
-
34548772699
-
Towards Automatically Identifying Trigger-based Behavior in Malware using Symbolic Execution and Binary Analysis
-
Technical Report CMU-CS-07-105, Carnegie Mellon University
-
D. Brumley, C. Hartwig, Z. Liang, J. Newsome, D. Song, and H. Yin. Towards Automatically Identifying Trigger-based Behavior in Malware using Symbolic Execution and Binary Analysis. Technical Report CMU-CS-07-105, Carnegie Mellon University, 2007.
-
(2007)
-
-
Brumley, D.1
Hartwig, C.2
Liang, Z.3
Newsome, J.4
Song, D.5
Yin, H.6
-
6
-
-
33751056900
-
Towards automatic generation of vulnerability-based signatures
-
D. Brumley, J. Newsome, D. Song, H. Wang, and S. Jha. Towards automatic generation of vulnerability-based signatures. In IEEE Symposium on Security and Privacy, 2006.
-
(2006)
IEEE Symposium on Security and Privacy
-
-
Brumley, D.1
Newsome, J.2
Song, D.3
Wang, H.4
Jha, S.5
-
7
-
-
34547241782
-
EXE: Automatically Generating Inputs of Death
-
C. Cadar, V Ganesh, P. Pawlowski, D. Dill, and D. Engler. EXE: Automatically Generating Inputs of Death. In Conference on Computer and Communication Security, 2006.
-
(2006)
Conference on Computer and Communication Security
-
-
Cadar, C.1
Ganesh, V.2
Pawlowski, P.3
Dill, D.4
Engler, D.5
-
8
-
-
84924223669
-
Static Analysis of Executables to Detect Malicious Patterns
-
M. Christodorescu and S. Jha. Static Analysis of Executables to Detect Malicious Patterns. In Usenix Security Symposium, 2003.
-
(2003)
Usenix Security Symposium
-
-
Christodorescu, M.1
Jha, S.2
-
9
-
-
27544433210
-
Semantics-aware Malware Detection
-
M. Christodorescu, S. Jha, S. Seshia, D. Song, and R. Bryant. Semantics-aware Malware Detection. In IEEE Symposium on Security and Privacy, 2005.
-
(2005)
IEEE Symposium on Security and Privacy
-
-
Christodorescu, M.1
Jha, S.2
Seshia, S.3
Song, D.4
Bryant, R.5
-
10
-
-
0033697422
-
Bandera: Extracting Finite-State Models from Java Source Code
-
J. Corbett, M. Dwyer, J. Hatcliff, S. Laubach, C. Pasareanu, Robby, and H. Zheng. Bandera: Extracting Finite-State Models from Java Source Code. In International Conference on Software Engineering (ICSE), 2000.
-
(2000)
International Conference on Software Engineering (ICSE)
-
-
Corbett, J.1
Dwyer, M.2
Hatcliff, J.3
Laubach, S.4
Pasareanu, C.5
Robby6
Zheng, H.7
-
11
-
-
84885679117
-
-
M. Costa, J. Crowcroft, M. Castro, A. Rowstron, L. Zhou, L. Zhang, and P. Barham. Vigilante: End-to-End Containment of Internet Worms. In 20th ACM Symposium on Operating Systems Principles (SOSP), 2005.
-
M. Costa, J. Crowcroft, M. Castro, A. Rowstron, L. Zhou, L. Zhang, and P. Barham. Vigilante: End-to-End Containment of Internet Worms. In 20th ACM Symposium on Operating Systems Principles (SOSP), 2005.
-
-
-
-
13
-
-
34547478273
-
Temporal Search: Detecting Hidden Malware Timebombs with Virtual Machines
-
J. Crandall, G. Wassermann, D. Oliveira, Z. Su, F. Wu, and F. Chong. Temporal Search: Detecting Hidden Malware Timebombs with Virtual Machines. In Conference on Architectural Support for Programming Languages and OS, 2006.
-
(2006)
Conference on Architectural Support for Programming Languages and OS
-
-
Crandall, J.1
Wassermann, G.2
Oliveira, D.3
Su, Z.4
Wu, F.5
Chong, F.6
-
18
-
-
18944390941
-
The model checker spin
-
G. Holzmann. The model checker spin. Software Engineering, 23(5), 1997.
-
(1997)
Software Engineering
, vol.23
, Issue.5
-
-
Holzmann, G.1
-
19
-
-
0016971687
-
Symbolic Execution and Program Testing
-
J. King. Symbolic Execution and Program Testing. Communications of the ACM, 1976.
-
(1976)
Communications of the ACM
-
-
King, J.1
-
20
-
-
85077680022
-
Behavior-based Spyware Detection
-
E. Kirda, C. Kruegel, G. Banks, G. Vigna, and R. Kemmerer. Behavior-based Spyware Detection. In Usenix Security Symposium, 2006.
-
(2006)
Usenix Security Symposium
-
-
Kirda, E.1
Kruegel, C.2
Banks, G.3
Vigna, G.4
Kemmerer, R.5
-
23
-
-
79953672829
-
Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software
-
J. Newsome and D. Song. Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software. In 12th Annual Network and Distributed System Security Symposium (NDSS), 2005.
-
(2005)
12th Annual Network and Distributed System Security Symposium (NDSS)
-
-
Newsome, J.1
Song, D.2
-
24
-
-
84885629677
-
-
E. Nightingale, P. Chen, and J. Flinn. Speculative Execution in a Distributed File System. In 20th Symposium on Operating Systems Principles (SOSP), 2005.
-
E. Nightingale, P. Chen, and J. Flinn. Speculative Execution in a Distributed File System. In 20th Symposium on Operating Systems Principles (SOSP), 2005.
-
-
-
-
30
-
-
34547476456
-
-
Method of Program Code Obfuscation. PhD thesis, Wroclaw University of Technology
-
G. Wroblewski. General Method of Program Code Obfuscation. PhD thesis, Wroclaw University of Technology, 2002.
-
(2002)
General
-
-
Wroblewski, G.1
|