-
4
-
-
38049076951
-
Wikipedia hijacked by malware
-
November
-
Broersma, M.: Wikipedia hijacked by malware. Techworld (November 2006) http://www.techworld.com/news/index.cfm?RSS&NewsID=7254
-
(2006)
Techworld
-
-
Broersma, M.1
-
5
-
-
0347104967
-
Possible Virus Attacks Against Integrity Programs and How to Prevent Them
-
Proc. 2nd Int
-
Bontchev, V.: Possible Virus Attacks Against Integrity Programs and How to Prevent Them. In: Proc. 2nd Int. Virus Bull. Conf. pp. 131-141 (1992)
-
(1992)
Virus Bull. Conf. pp
, vol.131-141
-
-
Bontchev, V.1
-
6
-
-
38049082165
-
Macro Virus Identification Problems
-
Proc. 7th Int
-
Bontchev, V.: Macro Virus Identification Problems. In: Proc. 7th Int. Virus Bull. Conf. pp. 175-196 (1997)
-
(1997)
Virus Bull. Conf. pp
, vol.175-196
-
-
Bontchev, V.1
-
7
-
-
33746896615
-
Open Problems in Computer Virology
-
Filiol, E., Helenius, M., Zanero, S.: Open Problems in Computer Virology. Journal in Computer Virology, pp. 55-66 (2006)
-
(2006)
Journal in Computer Virology
, pp. 55-66
-
-
Filiol, E.1
Helenius, M.2
Zanero, S.3
-
8
-
-
33750335757
-
-
Wang, K., Parekh, J., Stolfo, S.J.: Anagram: A Content Anomaly Detector Resistant to Mimicry Attack. In: Zamboni, D., Kruegel, C. (eds.) RAID 2006. LNCS, 4219, Springer, Heidelberg (2006)
-
Wang, K., Parekh, J., Stolfo, S.J.: Anagram: A Content Anomaly Detector Resistant to Mimicry Attack. In: Zamboni, D., Kruegel, C. (eds.) RAID 2006. LNCS, vol. 4219, Springer, Heidelberg (2006)
-
-
-
-
9
-
-
33745456200
-
Fileprints: Identifying File Types by n-gram Analysis
-
Li, W.-J., Wang, K., Stolfo, S.J., Herzog, B.: Fileprints: Identifying File Types by n-gram Analysis. In: 2005 IEEE Information Assurance Workshop (2005)
-
(2005)
2005 IEEE Information Assurance Workshop
-
-
Li, W.-J.1
Wang, K.2
Stolfo, S.J.3
Herzog, B.4
-
10
-
-
38049083984
-
-
Stolfo, S.J., Wang, K., Li, W.-J.: Towards Stealthy Malware Detection. In: Jha, Christodorescu, Wang (eds.) Malware Detection Book, Springer, Heidelberg (2006)
-
Stolfo, S.J., Wang, K., Li, W.-J.: Towards Stealthy Malware Detection. In: Jha, Christodorescu, Wang (eds.) Malware Detection Book, Springer, Heidelberg (2006)
-
-
-
-
11
-
-
0034838197
-
Data Mining Methods for Detection of New Malicious Executables
-
Oakland, CA May
-
Schultz, M.G., Eskin, E., Zadok, E., Stolfo, S.J.: Data Mining Methods for Detection of New Malicious Executables. In: IEEE Symposium on Security and Privacy, Oakland, CA (May 2001)
-
(2001)
IEEE Symposium on Security and Privacy
-
-
Schultz, M.G.1
Eskin, E.2
Zadok, E.3
Stolfo, S.J.4
-
12
-
-
33746864380
-
Detection of New Malicious Code Using N-grams Signatures
-
October 13-15
-
Abou-Assaleh, T., Cercone, N., Keselj, V., Sweidan, R.: Detection of New Malicious Code Using N-grams Signatures. In: Proceedings of Second Annual Conference on Privacy, Security and Trust, October 13-15, 2004 (2004)
-
(2004)
Proceedings of Second Annual Conference on Privacy, Security and Trust
-
-
Abou-Assaleh, T.1
Cercone, N.2
Keselj, V.3
Sweidan, R.4
-
13
-
-
18844362133
-
-
Abou-Assaleh, T, Cercone, N, Keselj, V, Sweidan, R, N-gram-based Detection of New Malicious Code. In: Proceedings of the 28th IEEE Annual International Computer Software and Applications Conference, COMPSAC 2004. Hong Kong. September 28-30,2004 2004
-
Abou-Assaleh, T., Cercone, N., Keselj, V., Sweidan, R.: N-gram-based Detection of New Malicious Code. In: Proceedings of the 28th IEEE Annual International Computer Software and Applications Conference, COMPSAC 2004. Hong Kong. September 28-30,2004 (2004)
-
-
-
-
16
-
-
38049053108
-
-
Noga, A.J.: A Visual Data Hash Method. Air Force Research report (October 2004)
-
Noga, A.J.: A Visual Data Hash Method. Air Force Research report (October 2004)
-
-
-
-
17
-
-
38049052578
-
Kolmogorov Complexity Estimates for Detection of Viruses
-
Goel, S.: Kolmogorov Complexity Estimates for Detection of Viruses. Complexity Journal 9(2) (2003)
-
(2003)
Complexity Journal
, vol.9
, Issue.2
-
-
Goel, S.1
-
18
-
-
38049063086
-
-
Steganalysis http://niels.xtdnet.nl/stego/
-
Steganalysis
-
-
-
19
-
-
33846854810
-
-
Available from
-
K2. ADMmutate (2001) Available from http://www.ktwo.ca/security.html
-
(2001)
K2. ADMmutate
-
-
-
20
-
-
27544481859
-
-
Analysis. Phrack
-
Detristan, T., Ulenspiegel, T., Malcom, Y., Underduk, M.: Polymorphic Shellcode Engine Using Spectrum Analysis. Phrack (2003)
-
(2003)
Polymorphic Shellcode Engine Using Spectrum
-
-
Detristan, T.1
Ulenspiegel, T.2
Malcom, Y.3
Underduk, M.4
-
21
-
-
33750343827
-
Advanced Polymorphic Worms: Evading IDS by Blending in with Normal Traffic
-
Georgia Tech: Vancouver, BC, Canada
-
Kolesnikov, O., Lee, W.: Advanced Polymorphic Worms: Evading IDS by Blending in with Normal Traffic. USENIX Security Symposium, Georgia Tech: Vancouver, BC, Canada (2006)
-
(2006)
USENIX Security Symposium
-
-
Kolesnikov, O.1
Lee, W.2
-
22
-
-
38049092076
-
-
Shaner: US Patent No. 5,991,714 November 1999
-
Shaner: US Patent No. 5,991,714 (November 1999)
-
-
-
-
23
-
-
38049043479
-
-
Song, Y., Locasto, M.E., Stavrou, A., Keromytis, A.D., Stolfo, S.J.: On the Infeasibility of Modeling Polymorphic Shellcode for Signature Detection Tech. report cucs-00707, Columbia University (February 2007)
-
Song, Y., Locasto, M.E., Stavrou, A., Keromytis, A.D., Stolfo, S.J.: On the Infeasibility of Modeling Polymorphic Shellcode for Signature Detection Tech. report cucs-00707, Columbia University (February 2007)
-
-
-
-
24
-
-
38049035522
-
-
Internet Norman SandBox Whitepaper
-
Natvig, K.: SandboxII: Internet Norman SandBox Whitepaper (2002)
-
(2002)
SandboxII
-
-
Natvig, K.1
-
25
-
-
34047110218
-
Toward Automated Dynamic Malware Analysis Using CWSandbox
-
Willems, C., Freiling, F., Holz, T.: Toward Automated Dynamic Malware Analysis Using CWSandbox. IEEE Security and Privacy Magazine 5(2), 32-39 (2007)
-
(2007)
IEEE Security and Privacy Magazine
, vol.5
, Issue.2
, pp. 32-39
-
-
Willems, C.1
Freiling, F.2
Holz, T.3
-
27
-
-
41149087693
-
-
OSDI, Seattle, WA
-
Reis, C., Dunagan, J., Wang, H.J., Dubrovsky, O., Esmeir, S.: BrowserShield: Vulnerability-Driven Filtering of Dynamic HTML. OSDI, Seattle, WA (2006)
-
(2006)
BrowserShield: Vulnerability-Driven Filtering of Dynamic HTML
-
-
Reis, C.1
Dunagan, J.2
Wang, H.J.3
Dubrovsky, O.4
Esmeir, S.5
-
28
-
-
38049092577
-
-
POIFS
-
POIFS: http://jakarta.apache.org/
-
-
-
-
29
-
-
0014814325
-
Space/time trade-offs in hash coding with allowable errors
-
Bloom, B.H.: Space/time trade-offs in hash coding with allowable errors. Communications of the ACM 13(7), 422-426 (1970)
-
(1970)
Communications of the ACM
, vol.13
, Issue.7
, pp. 422-426
-
-
Bloom, B.H.1
-
30
-
-
33745641552
-
-
Wang, K., Cretu, G., Stolfo, S.J.: Anomalous Payload-based Worm Detection and Signature Generation. In: Valdes, A., Zamboni, D. (eds.) RAID 2005. LNCS, 3858, Springer, Heidelberg (2006)
-
Wang, K., Cretu, G., Stolfo, S.J.: Anomalous Payload-based Worm Detection and Signature Generation. In: Valdes, A., Zamboni, D. (eds.) RAID 2005. LNCS, vol. 3858, Springer, Heidelberg (2006)
-
-
-
-
32
-
-
38049088396
-
-
http://vx.netlux.org/
-
-
-
-
34
-
-
2642547913
-
On-line intrusion detection and attack prevention using diversity, generate-and-test, and generalization
-
Reynolds, J.C., Just, J., Clough, L., Maglich, R.: On-line intrusion detection and attack prevention using diversity, generate-and-test, and generalization. In: Proceedings of the 36th Hawaii International Conference on System Sciences (2003)
-
(2003)
Proceedings of the 36th Hawaii International Conference on System Sciences
-
-
Reynolds, J.C.1
Just, J.2
Clough, L.3
Maglich, R.4
-
35
-
-
84904088330
-
Automated Web Patrol with Strider HoneyMonkeys: Finding Web Sites That Exploit Browser Vulnerabilities
-
Wang, Y.-M., Beck, D., Jiang, X., Roussev, R.: Automated Web Patrol with Strider HoneyMonkeys: Finding Web Sites That Exploit Browser Vulnerabilities. In: NDSS 2006
-
(2006)
NDSS
-
-
Wang, Y.-M.1
Beck, D.2
Jiang, X.3
Roussev, R.4
|