-
1
-
-
49949112231
-
-
Computer Security Institute, CSI Survey
-
Computer Security Institute, CSI Survey 2007 (2007), http://www.gocsi.com
-
(2007)
-
-
-
2
-
-
49949104851
-
-
Virus Bulletin
-
Virus Bulletin (2007), http://www.virusbtn.com/news/2007
-
(2007)
-
-
-
9
-
-
35248895400
-
A service-oriented solution framework for distributed virus detection and vulnerability remediation (VDVR) system
-
July
-
Zhou, Q.: A service-oriented solution framework for distributed virus detection and vulnerability remediation (VDVR) system. In: Proc. Int. Gryptology Conf. Services Computing, pp. 569-573 (July 2007)
-
(2007)
Proc. Int. Gryptology Conf. Services Computing
, pp. 569-573
-
-
Zhou, Q.1
-
10
-
-
33744472260
-
A proxy automatic signature scheme using a compiler in distributed systems for unknown virus detection
-
Advanced Information Networking and Applications, pp, March
-
Shin-Jia, H., Kuang-Hsi, C.: A proxy automatic signature scheme using a compiler in distributed systems for unknown virus detection. In: Proc. Int. Conf. Advanced Information Networking and Applications, pp. 649-654 (March 2005)
-
(2005)
Proc. Int. Conf
, pp. 649-654
-
-
Shin-Jia, H.1
Kuang-Hsi, C.2
-
11
-
-
49949090113
-
-
Yoo, I., Ultes-Nitsche, U.: Adaptive detection, of worms/viruses in firewalls. In: Proc. Int. Conf. Security Technology (October 2004)
-
Yoo, I., Ultes-Nitsche, U.: Adaptive detection, of worms/viruses in firewalls. In: Proc. Int. Conf. Security Technology (October 2004)
-
-
-
-
12
-
-
34748865971
-
A feature selection and evaluation scheme for computer virus detection
-
December
-
Henchiri, O., Japkowicz, N.: A feature selection and evaluation scheme for computer virus detection. In: Proc. Int. Conf. Data Mining, pp. 891-895 (December 2006)
-
(2006)
Proc. Int. Conf. Data Mining
, pp. 891-895
-
-
Henchiri, O.1
Japkowicz, N.2
-
13
-
-
77950788046
-
Panorama: Capturing system-wide information flow for maiware detection and analysis
-
Computer and Communication Security, pp, October
-
Yin, H., Song, D., Egele, M., Kruegel, C., Kirda, E.: Panorama: Capturing system-wide information flow for maiware detection and analysis. In: Proc. ACM Conf. Computer and Communication Security, pp. 116-127 (October 2007)
-
(2007)
Proc. ACM Conf
, pp. 116-127
-
-
Yin, H.1
Song, D.2
Egele, M.3
Kruegel, C.4
Kirda, E.5
-
14
-
-
33745434458
-
Reverse code engineering: An in-depth analysis of the Bagle virus
-
Information Assurance and Security, pp, June
-
Rozinov, K.: Reverse code engineering: An in-depth analysis of the Bagle virus. In: Proc. Wkshp. Information Assurance and Security, pp. 380 387 (June 2005)
-
(2005)
Proc. Wkshp
, pp. 380-387
-
-
Rozinov, K.1
-
15
-
-
27544433210
-
Semantics-aware maiware detection
-
May
-
Christodorescu, M., Jha, S., Seshia, S.A., Song, D., Bryant, R.E.: Semantics-aware maiware detection. In: Proc. IEEE Symp. Security and Privacy, pp. 32-46 (May 2005)
-
(2005)
Proc. IEEE Symp. Security and Privacy
, pp. 32-46
-
-
Christodorescu, M.1
Jha, S.2
Seshia, S.A.3
Song, D.4
Bryant, R.E.5
-
16
-
-
51849164885
-
A semantics-based approach to malware detection
-
January
-
Preda, M.D., Christodorescu, M., Jha, S., Debray, S.: A semantics-based approach to malware detection. In: Proc. Conf. Principles of Programming Languages, pp. 377-388 (January 2007)
-
(2007)
Proc. Conf. Principles of Programming Languages
, pp. 377-388
-
-
Preda, M.D.1
Christodorescu, M.2
Jha, S.3
Debray, S.4
-
17
-
-
34548737161
-
Exploring multiple execution paths for malware analysis
-
May
-
Moser, A., Kruegel, C., Kirda, E.: Exploring multiple execution paths for malware analysis. In: Proc. IEEE Symp. Security and Privacy, pp. 231-245 (May 2007)
-
(2007)
Proc. IEEE Symp. Security and Privacy
, pp. 231-245
-
-
Moser, A.1
Kruegel, C.2
Kirda, E.3
-
18
-
-
85084162735
-
-
Goldberg, I., Wagner, D., Thomas, R., Brewer, E.A.: A. secure environment for untrusted helper applications confining the wily hacker. In: Proc. Conf. USENIX Security Symp., pp. 1-13 (July 1996)
-
Goldberg, I., Wagner, D., Thomas, R., Brewer, E.A.: A. secure environment for untrusted helper applications confining the wily hacker. In: Proc. Conf. USENIX Security Symp., pp. 1-13 (July 1996)
-
-
-
-
19
-
-
85084160542
-
A flexible containment mechanism for executing untrusted code
-
August
-
Peterson, D.S., Bishop, M., Pandey, R.: A flexible containment mechanism for executing untrusted code. In: Proc. Conf. USENIX Security Symp., pp. 207-225 (August 2002)
-
(2002)
Proc. Conf. USENIX Security Symp
, pp. 207-225
-
-
Peterson, D.S.1
Bishop, M.2
Pandey, R.3
-
20
-
-
77954097777
-
Secure mobile code execution service
-
December
-
Lam, L.-C., Yu, Y., Chiueh, T.-C.: Secure mobile code execution service. In: Proc. Conf. Large Installation System Administration, pp. 53-62 (December 2006)
-
(2006)
Proc. Conf. Large Installation System Administration
, pp. 53-62
-
-
Lam, L.-C.1
Yu, Y.2
Chiueh, T.-C.3
-
21
-
-
49949089503
-
-
VMWare Inc, Palo Alto
-
VMWare Inc., Palo Alto, VMWare browser appliance (2006), http://www.vmware.com/appliances/directory/browserapp.html
-
(2006)
VMWare browser appliance
-
-
-
24
-
-
49949094042
-
Virtualization-assisted framework for prevention of software vulnerability based security attacks
-
Tech. Rep. CE-J07-001, Dept. of Electrical Engineering, Princeton University December
-
Aaraj, N., Raghunathan, A., Jha, N.K.: Virtualization-assisted framework for prevention of software vulnerability based security attacks. Tech. Rep. CE-J07-001, Dept. of Electrical Engineering, Princeton University (December 2007)
-
(2007)
-
-
Aaraj, N.1
Raghunathan, A.2
Jha, N.K.3
-
25
-
-
31944440969
-
Pin: Building customized program analysis tools with dynamic instrumentation
-
June
-
Luk, C.-K., Cohn, R., Muth, R., Patil, H., Klauser, A., Lowney, G., Wallace, S., Reddi, V.J., Hazelwood, K.: Pin: Building customized program analysis tools with dynamic instrumentation. In: Proc. Programming Language Design and Implementation Forum, pp. 190-200 (June 2005)
-
(2005)
Proc. Programming Language Design and Implementation Forum
, pp. 190-200
-
-
Luk, C.-K.1
Cohn, R.2
Muth, R.3
Patil, H.4
Klauser, A.5
Lowney, G.6
Wallace, S.7
Reddi, V.J.8
Hazelwood, K.9
-
26
-
-
0036038345
-
Tracking down software bugs using automatic anomaly detection
-
May
-
Hangai, S., Lam, M.S.: Tracking down software bugs using automatic anomaly detection. In: Proc. Int. Conf. Software Engineering, pp. 291-301 (May 2002)
-
(2002)
Proc. Int. Conf. Software Engineering
, pp. 291-301
-
-
Hangai, S.1
Lam, M.S.2
-
27
-
-
0032639445
-
Dynamically discovering likely program invariants to support program evolution
-
May
-
Ernst, M.D., Cockrell, J., Griswold, W.G., Notkin, D.: Dynamically discovering likely program invariants to support program evolution. In: Proc. Int. Conf. Software Engineering, pp. 213-224 (May 1999)
-
(1999)
Proc. Int. Conf. Software Engineering
, pp. 213-224
-
-
Ernst, M.D.1
Cockrell, J.2
Griswold, W.G.3
Notkin, D.4
-
28
-
-
49949118517
-
-
Symantec corporation
-
Symantec corporation, Cupertino, The digital immune system (2007), http://www.symantec.com/avcenter/reference/dis.tech.brief.pdf
-
(2007)
Cupertino, The digital immune system
-
-
-
30
-
-
34547241782
-
EXE: Automatically generating inputs of death
-
November
-
Cadar, C., Ganesh, V., Pawlowski, P.M., Dill, D.L., Engler, D.R.: EXE: Automatically generating inputs of death. In: Proc. ACM Conf. Computer and Communications Security, pp. 322-335 (November 2006)
-
(2006)
Proc. ACM Conf. Computer and Communications Security
, pp. 322-335
-
-
Cadar, C.1
Ganesh, V.2
Pawlowski, P.M.3
Dill, D.L.4
Engler, D.R.5
-
31
-
-
78650021383
-
-
Brumley, D., Hartwig, C., Liang, Z., Newsome, J., Song, D., Yin, IL: Automatically identifying trigger-based behavior in maiware (2007), http://bitblaze.cs.berkeley.edu/papers/botnet.book-2007.pdf
-
(2007)
Automatically identifying trigger-based behavior in maiware
-
-
Brumley, D.1
Hartwig, C.2
Liang, Z.3
Newsome, J.4
Song, D.5
Yin, I.L.6
-
33
-
-
49949118688
-
-
VMWare Inc, Palo Alto
-
VMWare Inc., Palo Alto, Virtual Appliance Marketplace (2007), http://www.vmware.com/appliances
-
(2007)
Virtual Appliance Marketplace
-
-
-
34
-
-
49949112772
-
-
VX Heavens (2007), http://vx.netlux.org
-
(2007)
-
-
Heavens, V.X.1
-
35
-
-
49949106835
-
-
Computer Virus Codes (2007), http://virus-codes.blogspot.com
-
(2007)
Computer Virus Codes
-
-
-
36
-
-
49949084253
-
-
ELFCrypt (2005), http://www.infogreg.com/source-code/public-domain/ elfcrypt-v1.0.html
-
(2005)
-
-
ELFCrypt1
-
38
-
-
49949096889
-
-
Obfuscator download (2006), http://www.soft32.com/download.186322.html
-
(2006)
Obfuscator download
-
-
|