-
1
-
-
50149090093
-
-
Andersen, S., 2004. Changes to Functionality in Microsoft Windows XP Service Pack 2, Part 3: Memory Protection Technologies. .
-
Andersen, S., 2004. Changes to Functionality in Microsoft Windows XP Service Pack 2, Part 3: Memory Protection Technologies. .
-
-
-
-
2
-
-
50149100601
-
-
CA. Win32.sdbot Family (2005). .
-
CA. Win32.sdbot Family (2005). .
-
-
-
-
3
-
-
50149086044
-
-
CA. Win32.agobot Family (2006). .
-
CA. Win32.agobot Family (2006). .
-
-
-
-
4
-
-
0023294949
-
Computer viruses: theory and experiments
-
Cohen F. Computer viruses: theory and experiments. Comput. Security 6 1 (1987) 22-35
-
(1987)
Comput. Security
, vol.6
, Issue.1
, pp. 22-35
-
-
Cohen, F.1
-
5
-
-
50149096066
-
-
Cortes, C., Mohri, M., 2004. Confidence intervals for the area under the roc curve. In: NIPS 2004: Advances in Neural Information Processing Systems.
-
Cortes, C., Mohri, M., 2004. Confidence intervals for the area under the roc curve. In: NIPS 2004: Advances in Neural Information Processing Systems.
-
-
-
-
6
-
-
70349448915
-
-
Kang, M.G., Poosankam, P., Yin, H., 2007. Renovo: A hidden code extractor for packed executables. In: WORM'07: Proceedings of the 5th ACM Workshop on Recurring Malcode.
-
Kang, M.G., Poosankam, P., Yin, H., 2007. Renovo: A hidden code extractor for packed executables. In: WORM'07: Proceedings of the 5th ACM Workshop on Recurring Malcode.
-
-
-
-
7
-
-
33845768389
-
Learning to detect and classify malicious executables in the wild
-
Kolter J.Z., and Maloof M.A. Learning to detect and classify malicious executables in the wild. J. Mach. Learn. Res. 7 (2006) 2721-2744
-
(2006)
J. Mach. Learn. Res.
, vol.7
, pp. 2721-2744
-
-
Kolter, J.Z.1
Maloof, M.A.2
-
8
-
-
34047129159
-
Using entropy analysis to find encrypted and packed malware
-
Lyda R., and Hamrock J. Using entropy analysis to find encrypted and packed malware. IEEE Security Privacy 5 2 (2007) 40-45
-
(2007)
IEEE Security Privacy
, vol.5
, Issue.2
, pp. 40-45
-
-
Lyda, R.1
Hamrock, J.2
-
9
-
-
48649084773
-
-
Martignoni, L., Christodorescu, M., Jha, S., 2007. Omniunpack: fast, generic, and safe unpacking of malware. In: ACSAC'07: Proceedings of the 23rd Annual Computer Security Applications Conference on Annual Computer Security Applications Conference.
-
Martignoni, L., Christodorescu, M., Jha, S., 2007. Omniunpack: fast, generic, and safe unpacking of malware. In: ACSAC'07: Proceedings of the 23rd Annual Computer Security Applications Conference on Annual Computer Security Applications Conference.
-
-
-
-
10
-
-
50149122300
-
-
Morgenstern, M., Brosch, T., 2006. Runtime Packers: The Hidden Problem? Presented at Black Hat USA 2006.
-
Morgenstern, M., Brosch, T., 2006. Runtime Packers: The Hidden Problem? Presented at Black Hat USA 2006.
-
-
-
-
11
-
-
60349101742
-
-
Perdisci, R., Gu, G., Lee, W., 2006. Using an ensemble of one-class SVM classifiers to harden payload-based anomaly detection systems. In: ICDM'06: Proceedings of the Sixth International Conference on Data Mining.
-
Perdisci, R., Gu, G., Lee, W., 2006. Using an ensemble of one-class SVM classifiers to harden payload-based anomaly detection systems. In: ICDM'06: Proceedings of the Sixth International Conference on Data Mining.
-
-
-
-
12
-
-
50149090998
-
-
Pietrek, M., 2002a. An In-depth Look into the Win32 Portable Executable File Format. .
-
Pietrek, M., 2002a. An In-depth Look into the Win32 Portable Executable File Format. .
-
-
-
-
13
-
-
50149108044
-
-
Pietrek, M., 2002b. An In-depth Look into the Win32 Portable Executable File Format, part 2. .
-
Pietrek, M., 2002b. An In-depth Look into the Win32 Portable Executable File Format, part 2. .
-
-
-
-
14
-
-
34748820878
-
-
Royal, P., Halpin, M., Dagon, D., Edmonds, R., Lee, W., 2006. Polyunpack: automating the hidden-code extraction of unpack-executing malware. In: ACSAC'06: Proceedings of the 22nd Annual Computer Security Applications Conference on Annual Computer Security Applications Conference.
-
Royal, P., Halpin, M., Dagon, D., Edmonds, R., Lee, W., 2006. Polyunpack: automating the hidden-code extraction of unpack-executing malware. In: ACSAC'06: Proceedings of the 22nd Annual Computer Security Applications Conference on Annual Computer Security Applications Conference.
-
-
-
-
15
-
-
50149111664
-
-
Stepan, A., 2006 Improving Proactive Detection of Packed Malware. .
-
Stepan, A., 2006 Improving Proactive Detection of Packed Malware. .
-
-
-
-
16
-
-
33845735523
-
On inferring application protocol behaviors in encrypted network traffic
-
Wright C.V., Monrose F., and Masson G.M. On inferring application protocol behaviors in encrypted network traffic. J. Mach. Learn. Res. 7 (2006) 2745-2769
-
(2006)
J. Mach. Learn. Res.
, vol.7
, pp. 2745-2769
-
-
Wright, C.V.1
Monrose, F.2
Masson, G.M.3
|