-
3
-
-
32344438117
-
Detecting higher-level similarity patterns in programs
-
New York, NY, USA, ACM Press
-
H. A. Basit and S. Jarzabek. Detecting higher-level similarity patterns in programs. In Proc. 10th European Software Engineering Conference held jointly with 13th ACM SIGSOFT International Symposium on Foundations of Software Engineering (ESEG/FSE'05), pages 156-165, New York, NY, USA, 2005. ACM Press.
-
(2005)
Proc. 10th European Software Engineering Conference held jointly with 13th ACM SIGSOFT International Symposium on Foundations of Software Engineering (ESEG/FSE'05)
, pp. 156-165
-
-
Basit, H.A.1
Jarzabek, S.2
-
5
-
-
85081518838
-
-
BindView. Strace for NT. Published online at http://www.bindview.com/ Services/RAZOR/Utilities/Windows/strace-readme.cfm (accessed 9 Sep. 2006).
-
BindView. Strace for NT. Published online at http://www.bindview.com/ Services/RAZOR/Utilities/Windows/strace-readme.cfm (accessed 9 Sep. 2006).
-
-
-
-
7
-
-
27544433210
-
Semantics-aware malware detection
-
M. Christodorescu, S. Jha, S. A. Seshia, D. Song, and R. E. Bryant. Semantics-aware malware detection. In Proc. IEEE Symposium on Security and Privacy, pages 32-46, 2005.
-
(2005)
Proc. IEEE Symposium on Security and Privacy
, pp. 32-46
-
-
Christodorescu, M.1
Jha, S.2
Seshia, S.A.3
Song, D.4
Bryant, R.E.5
-
11
-
-
0036648690
-
CCFinder: A multilinguistic token-based code clone detection system for large scale source code
-
T. Kamiya, S. Kusumoto, and K. Inoue. CCFinder: A multilinguistic token-based code clone detection system for large scale source code. IEEE Transactions on Software Engineering, 28(7):654-670, 2002.
-
(2002)
IEEE Transactions on Software Engineering
, vol.28
, Issue.7
, pp. 654-670
-
-
Kamiya, T.1
Kusumoto, S.2
Inoue, K.3
-
12
-
-
26444526878
-
Detecting malicious code by model checking
-
J. Kinder, S. Katzenbeisser, C. Schallhart, and H. Veith. Detecting malicious code by model checking. In Proc. 2nd Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA'05), pages 174-187, 2005.
-
(2005)
Proc. 2nd Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA'05)
, pp. 174-187
-
-
Kinder, J.1
Katzenbeisser, S.2
Schallhart, C.3
Veith, H.4
-
14
-
-
33751040190
-
Reverse engineering of network signatures
-
C. Kruegel, D. Mutz, W. Robertson, G. Vigna, and R. Kemmerer. Reverse engineering of network signatures. In AusCERT Asia Pacific IT Security Conference, 2005.
-
(2005)
AusCERT Asia Pacific IT Security Conference
-
-
Kruegel, C.1
Mutz, D.2
Robertson, W.3
Vigna, G.4
Kemmerer, R.5
-
15
-
-
26444598206
-
On the detection of anomalous system call arguments
-
C. Kruegel, D. Mutz, F. Valeur, and G. Vigna. On the detection of anomalous system call arguments. In Proc. 8th European Symposium on Research in Computer Security (ESORICS'03), pages 101-118, 2003.
-
(2003)
Proc. 8th European Symposium on Research in Computer Security (ESORICS'03)
, pp. 101-118
-
-
Kruegel, C.1
Mutz, D.2
Valeur, F.3
Vigna, G.4
-
17
-
-
84981570490
-
Identification of program modifications and its applications in software maintenance
-
Nov. 9-12
-
J. Laski and W. Szermer. Identification of program modifications and its applications in software maintenance. In Proc. Conference on Software Maintenance, pages 282-290, Nov. 9-12 1992.
-
(1992)
Proc. Conference on Software Maintenance
, pp. 282-290
-
-
Laski, J.1
Szermer, W.2
-
18
-
-
32344452883
-
PR-Miner: Automatically extracting implicit programming rules and detecting violations in large software code
-
New York, NY, USA, ACM Press
-
Z. Li and Y. Zhou. PR-Miner: automatically extracting implicit programming rules and detecting violations in large software code. In Proc. 10th European Software Engineering Conference held jointly with 13th ACM SIGSOFT International Symposium on Foundations of Software Engineering (ESEG/FSE'05), pages 306-315, New York, NY, USA, 2005. ACM Press.
-
(2005)
Proc. 10th European Software Engineering Conference held jointly with 13th ACM SIGSOFT International Symposium on Foundations of Software Engineering (ESEG/FSE'05)
, pp. 306-315
-
-
Li, Z.1
Zhou, Y.2
-
19
-
-
23744514456
-
Russian doll
-
Aug
-
A. Marinescu. Russian doll. Virus Bulletin, 15(8):7-9, Aug. 2003.
-
(2003)
Virus Bulletin
, vol.15
, Issue.8
, pp. 7-9
-
-
Marinescu, A.1
-
22
-
-
0030736223
-
Computer virus-antivirus coevolution
-
Jan
-
C. Nachenberg. Computer virus-antivirus coevolution. Communications of the ACM, 40(1):46-51, Jan. 1997.
-
(1997)
Communications of the ACM
, vol.40
, Issue.1
, pp. 46-51
-
-
Nachenberg, C.1
-
23
-
-
0034829697
-
A fast automaton-based method for detecting anomalous program behaviors
-
R. Sekar, M. Bendre, D. Dhurjati, and P. Bollineni. A fast automaton-based method for detecting anomalous program behaviors. In IEEE Symposium on Security and Privacy, pages 144-155, 2001.
-
(2001)
IEEE Symposium on Security and Privacy
, pp. 144-155
-
-
Sekar, R.1
Bendre, M.2
Dhurjati, D.3
Bollineni, P.4
-
24
-
-
57149147896
-
-
Symantec Antivirus Research Center, Published online at, accessed 9 Sep. 2006
-
Symantec Antivirus Research Center. Expanded threat list and virus encyclopedia. Published online at http://www.symantec.com/enterprise/security- response/threatexplorer/index.jsp (accessed 9 Sep. 2006).
-
Expanded threat list and virus encyclopedia
-
-
-
28
-
-
8644273520
-
An environment for controlled worm replication & analysis (Internet-inna-Box)
-
I. Whalley, B. Arnold, D. Chess, J. Morar, and A. Segal. An environment for controlled worm replication & analysis (Internet-inna-Box). In Virus Bulletin Conference, 2000.
-
(2000)
Virus Bulletin Conference
-
-
Whalley, I.1
Arnold, B.2
Chess, D.3
Morar, J.4
Segal, A.5
-
29
-
-
37849008806
-
-
online at, accessed 16 Jan. 2004
-
zOmbie. zOmbie's homepage. Published online at http://z0mbie.host.sk (accessed 16 Jan. 2004).
-
Published
-
-
zOmbie1
zOmbie's homepage2
|