-
1
-
-
0542362337
-
An abstract theory of computer viruses
-
Proceedings of Advances in Cryptology CRYPTO'88, Springer, Berlin, Germany
-
ADLEMAN, L. M. 1988. An abstract theory of computer viruses. In Proceedings of Advances in Cryptology (CRYPTO'88). Lecture Notes in Computer Science, vol. 403. Springer, Berlin, Germany.
-
(1988)
Lecture Notes in Computer Science
, vol.403
-
-
ADLEMAN, L.M.1
-
2
-
-
79251578513
-
On the (im)possibility of obfuscating programs
-
Proceedings of the Advances in Cryptology CRYPTO'01, Springer
-
BARAK, B., GOLDREICH, O., ISMPAGLIAZZO, R., RUDICH, S., SAHAI, A., VADHAN, S., AND YANG, K. 2001. On the (im)possibility of obfuscating programs. In Proceedings of the Advances in Cryptology (CRYPTO'01). Lecture Notes in Computer Science, vol. 2139. Springer, 1-18.
-
(2001)
Lecture Notes in Computer Science
, vol.2139
, pp. 1-18
-
-
BARAK, B.1
GOLDREICH, O.2
ISMPAGLIAZZO, R.3
RUDICH, S.4
SAHAI, A.5
VADHAN, S.6
YANG, K.7
-
3
-
-
34247166239
-
Static detection of malicious code in executable programs
-
BERGERON, J., DEBBABI, M., DESHARNAIS, J., ERHIOUI, M. M., LAVOIE, Y., AND TAWBI, N. 2001. Static detection of malicious code in executable programs. Symposium on Requirements Engineering for Information Security. http://www.sreis.org/ old/2001/index.html.
-
(2001)
Symposium on Requirements Engineering for Information Security
-
-
BERGERON, J.1
DEBBABI, M.2
DESHARNAIS, J.3
ERHIOUI, M.M.4
LAVOIE, Y.5
TAWBI, N.6
-
4
-
-
51849160971
-
-
BRIESEMEISTER, L., PORRAS, P. A., AND TIWARI, A. 2005. Model checking of worm quarantine and counter-quarantine under a group defense. Tech. rep. SRI-CSL-05-03, Computer Science Laboratory. SRI International.
-
BRIESEMEISTER, L., PORRAS, P. A., AND TIWARI, A. 2005. Model checking of worm quarantine and counter-quarantine under a group defense. Tech. rep. SRI-CSL-05-03, Computer Science Laboratory. SRI International.
-
-
-
-
5
-
-
51849141053
-
-
CHESS, D. AND WHITE, S. 2000. An undetectable computer virus. In Proceedings of the Virus Bulletin Conference (VB2000). Virus Bulletin, Orlando, FL.
-
CHESS, D. AND WHITE, S. 2000. An undetectable computer virus. In Proceedings of the Virus Bulletin Conference (VB2000). Virus Bulletin, Orlando, FL.
-
-
-
-
6
-
-
84947229190
-
An approachtothe obfuscation of control-flow of sequential computer programs
-
Proceedings of the 4th International Information Security Conference ISC'01, G. Davida and Y. Frankel, Eds, Springer
-
CHOW, S., GU, Y., JOHNSON, H., AND ZAKHAROV,V. 2001. An approachtothe obfuscation of control-flow of sequential computer programs. In Proceedings of the 4th International Information Security Conference (ISC'01), G. Davida and Y. Frankel, Eds. Lecture Notes in Computer Science, vol. 2200. Springer, 144-155.
-
(2001)
Lecture Notes in Computer Science
, vol.2200
, pp. 144-155
-
-
CHOW, S.1
GU, Y.2
JOHNSON, H.3
ZAKHAROV, V.4
-
7
-
-
84924223669
-
Static analysis of executables to detect malicious patterns
-
USENIX Association, Berkeley, CA
-
CHRISTODORESCU, M. AND JHA, S. 2003. Static analysis of executables to detect malicious patterns. In Proceedings of the 12th USENIX Security Symposium (Security'03). USENIX Association, Berkeley, CA, 169-186.
-
(2003)
Proceedings of the 12th USENIX Security Symposium (Security'03)
, pp. 169-186
-
-
CHRISTODORESCU, M.1
JHA, S.2
-
9
-
-
27544433210
-
Semantics-aware malware detection
-
IEEE Computer Society, Los Alamitos, CA
-
CHRISTODORESCU, M., JHA, S., SESHIA, S. A., SONG, D., AND BRYANT, R. E. 2005. Semantics-aware malware detection. In Proceedings of the 2005 IEEE Symposium on Security and Privacy (S&P'05). IEEE Computer Society, Los Alamitos, CA, 32-46.
-
(2005)
Proceedings of the 2005 IEEE Symposium on Security and Privacy (S&P'05)
, pp. 32-46
-
-
CHRISTODORESCU, M.1
JHA, S.2
SESHIA, S.A.3
SONG, D.4
BRYANT, R.E.5
-
10
-
-
34547464948
-
Malware normalization
-
Tech. rep. 1539, University of Wisconsin, Madison. WI
-
CHRISTODORESCU, M., KINDER, J., JHA, S., KATZENBEISSER, S., AND VEITH, H. 2005. Malware normalization. Tech. rep. 1539, University of Wisconsin, Madison. WI.
-
(2005)
-
-
CHRISTODORESCU, M.1
KINDER, J.2
JHA, S.3
KATZENBEISSER, S.4
VEITH, H.5
-
11
-
-
0003962322
-
-
MIT Press, Cambridge, MA
-
CLARKE Jr. E. M., GRUMBERG, O., AND PELED, D. A. 2001. Model Checking. MIT Press, Cambridge, MA.
-
(2001)
Model Checking
-
-
CLARKE Jr., E.M.1
GRUMBERG, O.2
PELED, D.A.3
-
12
-
-
0004246220
-
-
Ph.D. thesis, University of Southern California
-
COHEN, F. 1985. Computer viruses. Ph.D. thesis, University of Southern California.
-
(1985)
Computer viruses
-
-
COHEN, F.1
-
13
-
-
0024682488
-
Computational aspects of computer viruses
-
COHEN, F. 1989. Computational aspects of computer viruses. Comput. Secur. 8, 4, 325.
-
(1989)
Comput. Secur
, vol.8
, Issue.4
, pp. 325
-
-
COHEN, F.1
-
14
-
-
0023294949
-
Computer viruses: Theory and experiments
-
COHEN, F. B. 1987. Computer viruses: Theory and experiments. Comput. Secur. 6, 22-35.
-
(1987)
Comput. Secur
, vol.6
, pp. 22-35
-
-
COHEN, F.B.1
-
15
-
-
0004046658
-
A taxonomy of obfuscating transformations
-
Tech. rep. 148, Department of Computer Sciences, University of Auckland
-
COLLBERG, C., THOMBORSON, C., AND LOW, D. 1997. A taxonomy of obfuscating transformations. Tech. rep. 148, Department of Computer Sciences, University of Auckland.
-
(1997)
-
-
COLLBERG, C.1
THOMBORSON, C.2
LOW, D.3
-
16
-
-
0031649930
-
Manufacturing cheap, resilient, and stealthy opaque constructs
-
ACM Press
-
COLLBERG, C., THOMBORSON, C., AND LOW, D. 1998. Manufacturing cheap, resilient, and stealthy opaque constructs. In Proceedings of the 25th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages (POPL'98). ACM Press, 184-196.
-
(1998)
Proceedings of the 25th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages (POPL'98)
, pp. 184-196
-
-
COLLBERG, C.1
THOMBORSON, C.2
LOW, D.3
-
19
-
-
0000963996
-
-
COUSOT, P. AND COUSOT, R. 1992. Abstract interpretation frameworks. J. Logic Comput. 2, 4 (Aug.), 511-547.
-
COUSOT, P. AND COUSOT, R. 1992. Abstract interpretation frameworks. J. Logic Comput. 2, 4 (Aug.), 511-547.
-
-
-
-
21
-
-
51849164885
-
A semantics-based approach to malware detection
-
ACM Press
-
DALLA PREDA, M., CHRISTODORESCU, M., JHA, S., AND DEBRAY, S. 2007. A semantics-based approach to malware detection. In Proceedings of the 32nd ACM Symp. on Principles of Programming Languages (POPL'07). ACM Press, 377-388.
-
(2007)
Proceedings of the 32nd ACM Symp. on Principles of Programming Languages (POPL'07)
, pp. 377-388
-
-
DALLA PREDA, M.1
CHRISTODORESCU, M.2
JHA, S.3
DEBRAY, S.4
-
22
-
-
33746053187
-
Control code obfuscation by abstract interpretation
-
IEEE Computer Society, Los Alamitos, CA, USA
-
DALLA PREDA, M. AND GIACOBAZZI, R. 2005. Control code obfuscation by abstract interpretation. In Proceedings of the 3rd IEEE International Conference on Software Engineering and Formal Methods (SEFM'05). IEEE Computer Society, Los Alamitos, CA, USA, 301-310.
-
(2005)
Proceedings of the 3rd IEEE International Conference on Software Engineering and Formal Methods (SEFM'05)
, pp. 301-310
-
-
DALLA PREDA, M.1
GIACOBAZZI, R.2
-
23
-
-
26444541676
-
Semantics-based code obfuscation by abstract interpretation
-
Proceedings of the 32nd International Colloquium on Automata, Languages and Programming ICALP'05, Springer
-
DALLA PREDA, M. AND GIACOBAZZI, R. 2005. Semantics-based code obfuscation by abstract interpretation. In Proceedings of the 32nd International Colloquium on Automata, Languages and Programming (ICALP'05). Lecture Notes in Computer Science, vol. 3580. Springer, 1325-1336.
-
(2005)
Lecture Notes in Computer Science
, vol.3580
, pp. 1325-1336
-
-
DALLA PREDA, M.1
GIACOBAZZI, R.2
-
24
-
-
51849129651
-
-
DETRISTAN, T., ULENSPIEGEL, T., MALCOM, Y., AND VON UNDERDUK, M. S. 2003. Polymorphic shellcode engine using spectrum analysis. Phrack 11, 61 http://www.phrack.org.
-
DETRISTAN, T., ULENSPIEGEL, T., MALCOM, Y., AND VON UNDERDUK, M. S. 2003. Polymorphic shellcode engine using spectrum analysis. Phrack 11, 61 http://www.phrack.org.
-
-
-
-
26
-
-
35248897174
-
An approach for detecting self-propagating email using anomaly detection
-
Proceedings of the 6th International Symposium on Recent Advances in Intrusion Detection RAID'03, G. Vigna, E. Jonsson, and C. Kruegel, Eds, Springer
-
GUPTA, A. AND SEKAR, R. 2003. An approach for detecting self-propagating email using anomaly detection. In Proceedings of the 6th International Symposium on Recent Advances in Intrusion Detection (RAID'03), G. Vigna, E. Jonsson, and C. Kruegel, Eds. Lecture Notes in Computer Science, vol. 2820. Springer, 55-72.
-
(2003)
Lecture Notes in Computer Science
, vol.2820
, pp. 55-72
-
-
GUPTA, A.1
SEKAR, R.2
-
28
-
-
33746877417
-
Dealing with metamorphism
-
JORDAN, M. 2002. Dealing with metamorphism. Virus Bull. 10, 4-6.
-
(2002)
Virus Bull
, vol.10
, pp. 4-6
-
-
JORDAN, M.1
-
29
-
-
26444526878
-
Detecting malicious code by model checking
-
Proceedings of the 2nd International Conference on Intrusion and Malware Detection and Vulnerability Assessment DIMVA'05, K. Julisch and C. Krügel, Eds, Springer
-
KINDER, J., KATZENBEISSER, S., SCHALLHART, C., AND VEITH, H. 2005. Detecting malicious code by model checking. In Proceedings of the 2nd International Conference on Intrusion and Malware Detection and Vulnerability Assessment (DIMVA'05), K. Julisch and C. Krügel, Eds. Lecture Notes in Computer Science, vol. 3548. Springer, 174-187.
-
(2005)
Lecture Notes in Computer Science
, vol.3548
, pp. 174-187
-
-
KINDER, J.1
KATZENBEISSER, S.2
SCHALLHART, C.3
VEITH, H.4
-
32
-
-
51849110045
-
Challenges in getting "formal" with viruses
-
LAKHOTIA, A. AND SINGH, P. K. 2000. Challenges in getting "formal" with viruses. In Virus Bull.
-
(2000)
Virus Bull
-
-
LAKHOTIA, A.1
SINGH, P.K.2
-
33
-
-
84944193544
-
A data mining and CIDF based approach for detecting novel and distributed intrusions
-
Proceedings of the 3rd International Workshop on Recent Advances in Intrusion Detection RAID 2000, Springer
-
LEE, W., NIMBALKAR, R. A., YEE, K. K., PATIL, S. B., DESAI, P. H., TRAN, T. T., AND STOLFO, S. J. 2000. A data mining and CIDF based approach for detecting novel and distributed intrusions. In Proceedings of the 3rd International Workshop on Recent Advances in Intrusion Detection (RAID 2000). Lecture Notes in Computer Sciences, vol. 1907. Springer, 49-65.
-
(2000)
Lecture Notes in Computer Sciences
, vol.1907
, pp. 49-65
-
-
LEE, W.1
NIMBALKAR, R.A.2
YEE, K.K.3
PATIL, S.B.4
DESAI, P.H.5
TRAN, T.T.6
STOLFO, S.J.7
-
35
-
-
0032676506
-
A data mining framework for building intrusion detection models
-
IEEE Computer Society, Los Alamitos, CA, USA
-
LEE, W., STOLFO, S., AND MOK, K. W. 1999. A data mining framework for building intrusion detection models. In Proceedings of the IEEE Symposium on Security and Privacy (S & P'99). IEEE Computer Society, Los Alamitos, CA, USA, 120-132.
-
(1999)
Proceedings of the IEEE Symposium on Security and Privacy (S & P'99)
, pp. 120-132
-
-
LEE, W.1
STOLFO, S.2
MOK, K.W.3
-
36
-
-
33745456200
-
-
LI, W.-J., WANG, K., STOLFO, S. J., AND HERZOG, B. 2005. Fileprints: Identifying file types by n-gram analysis. In Proceedings of the 6th Annual IEEE Systems, Man, and Cybernetics (SMC) Workshop on Information Assurance (IAW'05). IEEE Computer Society, 64-71.
-
LI, W.-J., WANG, K., STOLFO, S. J., AND HERZOG, B. 2005. Fileprints: Identifying file types by n-gram analysis. In Proceedings of the 6th Annual IEEE Systems, Man, and Cybernetics (SMC) Workshop on Information Assurance (IAW'05). IEEE Computer Society, 64-71.
-
-
-
-
38
-
-
0029488806
-
Mcf: A malicious code filter
-
LO, R. W., LEVITT, K. N., AND OLSSON, R. A. 1995. Mcf: A malicious code filter. Comput. Secur. 14, 541-566.
-
(1995)
Comput. Secur. 14
, pp. 541-566
-
-
LO, R.W.1
LEVITT, K.N.2
OLSSON, R.A.3
-
39
-
-
0012127229
-
Intrusion and intrusion detection
-
MCHUGH, J. 2001. Intrusion and intrusion detection. Int. J. Inform. Secu. 1, 1, 14-35.
-
(2001)
Int. J. Inform. Secu
, vol.1
, Issue.1
, pp. 14-35
-
-
MCHUGH, J.1
-
40
-
-
51849169154
-
-
MORLEY, P. 2001. Processing virus collections. In Proceedings of the Virus Bulletin Conference (VB2'001). Virus Bulletin, 129-134.
-
MORLEY, P. 2001. Processing virus collections. In Proceedings of the Virus Bulletin Conference (VB2'001). Virus Bulletin, 129-134.
-
-
-
-
41
-
-
0030736223
-
Computer virus-antivirus coevolution
-
NACHENBERG, C. 1997. Computer virus-antivirus coevolution. Comm. ACM 40, 1, 46-51.
-
(1997)
Comm. ACM
, vol.40
, Issue.1
, pp. 46-51
-
-
NACHENBERG, C.1
-
42
-
-
33846488392
-
Polymorphism
-
RAJAAT. 1999. Polymorphism. 29A Mag. 1, 3, 1-2.
-
(1999)
29A Mag. 1
, vol.3
, pp. 1-2
-
-
RAJAAT1
-
43
-
-
84946414079
-
Static verification of worm and virus behaviour in binary executables using model checking
-
IEEE Computer Society, Los Alamitos, CA, USA
-
SINGH, P. AND LAKHOTIA, A. 2003. Static verification of worm and virus behaviour in binary executables using model checking. In Proceedings of the 4th IEEE Information Assurance Workshop. IEEE Computer Society, Los Alamitos, CA, USA.
-
(2003)
Proceedings of the 4th IEEE Information Assurance Workshop
-
-
SINGH, P.1
LAKHOTIA, A.2
-
46
-
-
51849107061
-
-
SZÖR, P. AND FERRIE, P. 2001. Hunting for metamorphic. In Proceedings of the Virus Bulletin Conference (VB2001). Virus Bulletin, 123-144.
-
SZÖR, P. AND FERRIE, P. 2001. Hunting for metamorphic. In Proceedings of the Virus Bulletin Conference (VB2001). Virus Bulletin, 123-144.
-
-
-
-
47
-
-
34547197548
-
-
WALENSTEIN, A., MATHURS, R. CHOUCHANE, M. R., AND, LAKHOTIA, A 2006. Normalizing Metamorphic Malware Using Term Rewriting. In Proceedings of the 6th International Workshop on Source Code Analysis and Manipulation (SCAM'06). 75-84, IEEE Computer Society Press.
-
WALENSTEIN, A., MATHURS, R. CHOUCHANE, M. R., AND, LAKHOTIA, A 2006. Normalizing Metamorphic Malware Using Term Rewriting. In Proceedings of the 6th International Workshop on Source Code Analysis and Manipulation (SCAM'06). 75-84, IEEE Computer Society Press.
-
-
-
-
49
-
-
51849083983
-
-
Published online athttp:// last accessed on Sep. 29, 2006
-
ZOMBIE. 2001a. Automated reverse engineering: Mistfall engine. Published online athttp://www.madchat.org//vxdevl/papers/vxers/Z0mbie/autorev. txt (last accessed on Sep. 29, 2006).
-
(2001)
Automated reverse engineering: Mistfall engine
-
-
ZOMBIE1
-
50
-
-
51849118937
-
-
Published online at
-
ZOMBIE. 2001b. Real Permutating[sic] Engine. Published online at http://vx.netlux.org/vx.php?id=er05.
-
(2001)
Real Permutating[sic] Engine
-
-
ZOMBIE1
|