-
1
-
-
77950137996
-
-
Accessed June 12, 2008
-
E. Carrera. 4×5: Reverse engineering automation with python, 2007. https://www.blackhat.corn/presentations/bh-usa-07/Carrera/Presentation/ bh-usa-07-carrera.pdf. slides 26-32, Accessed June 12, 2008.
-
(2007)
4×5: Reverse engineering automation with python
-
-
Carrera, E.1
-
2
-
-
84924223669
-
-
M. Christodorescu and S. Jha. Static analysis of executables to detect malicious patterns. In 12th USENIX Security Symposium, pages 169-186,2003.
-
M. Christodorescu and S. Jha. Static analysis of executables to detect malicious patterns. In 12th USENIX Security Symposium, pages 169-186,2003.
-
-
-
-
4
-
-
54849414050
-
An automated virus classification system
-
M. Qheorghescu. An automated virus classification system. In Virus Bulletin Conference October 2005, pages 294-300, 2005.
-
(2005)
Virus Bulletin Conference October
, vol.2005
, pp. 294-300
-
-
Qheorghescu, M.1
-
5
-
-
58149090561
-
Binary feature extraction and comparison
-
Auckland, December 3-5
-
A. Kapoor and J. Spurlock. Binary feature extraction and comparison. In Presentation at AVAR 2006, Auckland, December 3-5, 2006.
-
(2006)
Presentation at AVAR 2006
-
-
Kapoor, A.1
Spurlock, J.2
-
6
-
-
85164392958
-
A study of cross-validation and bootstrap for accuracy estimation and model selection
-
R. Kohavi. A study of cross-validation and bootstrap for accuracy estimation and model selection. In IJCAI, pages 1137-1145, 1995.
-
(1995)
IJCAI
, pp. 1137-1145
-
-
Kohavi, R.1
-
7
-
-
58149084990
-
Dealing with virtualization packers
-
Boris Lau. Dealing with virtualization packers, 2008. 2nd CARO Workshop.
-
(2008)
2nd CARO Workshop
-
-
Lau, B.1
-
9
-
-
34249057779
-
Analysis of computer intrusions using sequences of function calls
-
S. Peisert, M. Bishop, S. Karin, and K. Marzullo. Analysis of computer intrusions using sequences of function calls. In IEEE Transactions on dependable and secure computing, volume 4, pages 3-15, 2007.
-
(2007)
IEEE Transactions on dependable and secure computing
, vol.4
, pp. 3-15
-
-
Peisert, S.1
Bishop, M.2
Karin, S.3
Marzullo, K.4
-
11
-
-
58149085108
-
Reverse engineering Microsoft binaries
-
A. Sotirov. Reverse engineering Microsoft binaries. In Recon 2006,2006.
-
(2006)
Recon 2006
-
-
Sotirov, A.1
-
13
-
-
80052319552
-
Hump and dump: Efficient generic unpacking using an ordered address execution histogram
-
Li Sun, Tim Ebringer, and Serdar Boztaş. Hump and dump: Efficient generic unpacking using an ordered address execution histogram. In 2nd CARO Workshop, 2008.
-
(2008)
2nd CARO Workshop
-
-
Sun, L.1
Ebringer, T.2
Boztaş, S.3
-
14
-
-
58149086572
-
-
http://www.datasecurity-event.com/uploads/hump-dump.pdf.
-
-
-
-
15
-
-
58149089093
-
Vilo: A shield in the malware variation battle
-
M. Venable, A. Walenstein, M. Hayes, C. Thompson, and A. Lakhotia. Vilo: a shield in the malware variation battle. In Virus Bulletin, pages 5-9, 2007.
-
(2007)
Virus Bulletin
, pp. 5-9
-
-
Venable, M.1
Walenstein, A.2
Hayes, M.3
Thompson, C.4
Lakhotia, A.5
-
17
-
-
34548718159
-
Obfuscated malicious executable scanner
-
J. Xu, A.H. Sung, S. Mukkamata, and Q. Liu. Obfuscated malicious executable scanner. Research and Practice in Information Technology, 39:181-197, 2007.
-
(2007)
Research and Practice in Information Technology
, vol.39
, pp. 181-197
-
-
Xu, J.1
Sung, A.H.2
Mukkamata, S.3
Liu, Q.4
|