-
4
-
-
77952405499
-
Raising the bar for windows rootkit detection
-
July
-
Butler, J., Sparks, S.: Raising the bar for windows rootkit detection. Phrack 63 (July 2005)
-
(2005)
Phrack
, vol.63
-
-
Butler, J.1
Sparks, S.2
-
5
-
-
27544433210
-
Semantics-Aware Malware Detection
-
Oakland, IEEE Computer Society Press, Los Alamitos
-
Christodorescu, M., Jha, S., Seshia, S., Song, D., Bryant, R.: Semantics-Aware Malware Detection. In: Proceedings of IEEE Symposium on Security and Privacy (Oakland), IEEE Computer Society Press, Los Alamitos (2005)
-
(2005)
Proceedings of IEEE Symposium on Security and Privacy
-
-
Christodorescu, M.1
Jha, S.2
Seshia, S.3
Song, D.4
Bryant, R.5
-
6
-
-
38149030556
-
-
Cogswell, B., Russinovich, M.: Rootkitrevealer vl.71 (November 2006), http:// www.microsoft.com/technet/sysinternals/utilities/RootkitRevealer.mspx
-
Cogswell, B., Russinovich, M.: Rootkitrevealer vl.71 (November 2006), http:// www.microsoft.com/technet/sysinternals/utilities/RootkitRevealer.mspx
-
-
-
-
8
-
-
38149040573
-
-
Corporation, S.: Norton antivirus, http://www.symantec.com/home. homeoffice/ products/overview.jsp?pcid-isftp vid-nav2006
-
Corporation, S.: Norton antivirus, http://www.symantec.com/home. homeoffice/ products/overview.jsp?pcid-isftp vid-nav2006
-
-
-
-
9
-
-
38149127830
-
-
Corporation, S.: Internet security threat report (September 2006), http://www.Symantec.com/enterprise/threatreport/index.jsp
-
Corporation, S.: Internet security threat report (September 2006), http://www.Symantec.com/enterprise/threatreport/index.jsp
-
-
-
-
10
-
-
38149110272
-
Automated reverse engineering
-
July
-
Flake, H.: Automated reverse engineering. In: Proceedings of Black Hat 2004 (July 2004)
-
(2004)
Proceedings of Black Hat
-
-
Flake, H.1
-
11
-
-
38149114424
-
-
Fuzen: Fu rootkit, http://www.rootkit.com/project.php7id-12
-
Fuzen: Fu rootkit
-
-
-
14
-
-
33746882464
-
-
European Research Journal of Computer Virology
-
Karim, M., Walenstein, A., Lakhotia, A., Parida, L.: Malware phylogeny generation using permutations of code. European Research Journal of Computer Virology (2005)
-
(2005)
Malware phylogeny generation using permutations of code
-
-
Karim, M.1
Walenstein, A.2
Lakhotia, A.3
Parida, L.4
-
15
-
-
85077680022
-
Behavior-based spyware detectionl
-
Kirda, E., Kruegel, C., Banks, G., Vigna, G., Kemmerer, R.: Behavior-based spyware detectionl. In: Proceedings of Usenix Security Symposium (2006)
-
(2006)
Proceedings of Usenix Security Symposium
-
-
Kirda, E.1
Kruegel, C.2
Banks, G.3
Vigna, G.4
Kemmerer, R.5
-
16
-
-
38149032089
-
-
Kruegel, C., Robertson, W., Vigna, G.: Detecting kernel-level rootkits through binary analysis. In: Yew, P.-C., Xue, J. (eds.) ACSAC 2004. LNCS, 3189, Springer, Heidelberg (2004)
-
Kruegel, C., Robertson, W., Vigna, G.: Detecting kernel-level rootkits through binary analysis. In: Yew, P.-C., Xue, J. (eds.) ACSAC 2004. LNCS, vol. 3189, Springer, Heidelberg (2004)
-
-
-
-
18
-
-
38149066427
-
-
out on rootkits
-
Livingston, B.: Icesword author speaks out on rootkits, http://itmanagement. earthweb.com/columns/executive.tech/article.php/351262i
-
Icesword author speaks
-
-
Livingston, B.1
-
20
-
-
34548737161
-
Exploring Multiple Execution Paths for Malware Analysis
-
IEEE Computer Society Press, Los Alamitos
-
Moser, A., Kruegel, C., Kirda, E.: Exploring Multiple Execution Paths for Malware Analysis. In: Proceedings of 2007 IEEE Symposium on Security and Privacy, IEEE Computer Society Press, Los Alamitos (2007)
-
(2007)
Proceedings of 2007 IEEE Symposium on Security and Privacy
-
-
Moser, A.1
Kruegel, C.2
Kirda, E.3
-
21
-
-
85084162914
-
Copilot - a coprocessor-based kernel runtime integrity monitor
-
Petroni, N., Fraser, T., Molina, J., Arbaugh, W.: Copilot - a coprocessor-based kernel runtime integrity monitor. In: Proceedings of Usenix Security Symposium (August 2004)
-
(2004)
Proceedings of Usenix Security Symposium (August
-
-
Petroni, N.1
Fraser, T.2
Molina, J.3
Arbaugh, W.4
-
22
-
-
38149060455
-
-
Research, P.: Rootkit cleaner, http://research.pandasoftware.com/blogs/ research/archive/2006/12/14/Rootkit-cleaner.aspx
-
Research, P.: Rootkit cleaner, http://research.pandasoftware.com/blogs/ research/archive/2006/12/14/Rootkit-cleaner.aspx
-
-
-
-
28
-
-
84857573917
-
-
Sophos: Sophos anti-rootkit, http://www.sophos.com/products/free-tools/ 8ophos-anti-rootkit.html
-
Sophos anti-rootkit
-
-
Sophos1
-
30
-
-
27544461178
-
Detecting stealth software with strider ghostbuster
-
DSN-DCCS, June
-
Wang, Y., Beck, D., Roussev, R., Verbowski, C.: Detecting stealth software with strider ghostbuster. In: Proc. Int. Conf. on Dependable Systems and Networks (DSN-DCCS) (June 2005)
-
(2005)
Proc. Int. Conf. on Dependable Systems and Networks
-
-
Wang, Y.1
Beck, D.2
Roussev, R.3
Verbowski, C.4
-
31
-
-
79960164190
-
Gatekeeper: Monitoring auto-start extensibility points (aseps) for spyware management
-
LISA
-
Wang, Y., Roussev, R., Verbowski, C., Johnson, A., Wu, M., Huang, Y., Kuo, S.: Gatekeeper: Monitoring auto-start extensibility points (aseps) for spyware management. In: Proceedings of Usenix Large Installation System Administration Conference (LISA) (2004)
-
(2004)
Proceedings of Usenix Large Installation System Administration Conference
-
-
Wang, Y.1
Roussev, R.2
Verbowski, C.3
Johnson, A.4
Wu, M.5
Huang, Y.6
Kuo, S.7
-
32
-
-
38149107015
-
-
Wikipedia: bayes classifier
-
Wikipedia: Naive bayes classifier, http://en.wikipedia.org/wiki/Naive. Bayes.classifier
-
Naive
-
-
|