-
2
-
-
84869255587
-
-
PEiD. http://peid.has.it/.
-
PEiD
-
-
-
3
-
-
84869245143
-
-
VMware. http://www.vmware.com/.
-
VMware
-
-
-
5
-
-
18844362133
-
-
T. Abou-Assaleh, N. Cercone, V. Keselj, and R. Sweidan. N-gram-based detection of new malicious code. In Proceedings of the 28th Annual International Computer Software and Applications Conference, Workshops and Fast Abstracts, COMPSAC'04, 02, pages 41-42, 2004
-
T. Abou-Assaleh, N. Cercone, V. Keselj, and R. Sweidan. N-gram-based detection of new malicious code. In Proceedings of the 28th Annual International Computer Software and Applications Conference - Workshops and Fast Abstracts - (COMPSAC'04) - Volume 02, pages 41-42, 2004.
-
-
-
-
6
-
-
3943082567
-
Detecting malicious software by monitoring anomalous windows registry accesses
-
Technical report
-
F. Apap, A. Honig, S. Hershkop, E. Eskin, and S. Stolfo. Detecting malicious software by monitoring anomalous windows registry accesses. Technical report, 2001.
-
(2001)
-
-
Apap, F.1
Honig, A.2
Hershkop, S.3
Eskin, E.4
Stolfo, S.5
-
7
-
-
2342473490
-
Automatically generated win32 heuristic virus detection
-
W. Arnold and G. Tesauro. Automatically generated win32 heuristic virus detection. In Virus Bulletin Conference, pages 123-132, 2000.
-
(2000)
Virus Bulletin Conference
, pp. 123-132
-
-
Arnold, W.1
Tesauro, G.2
-
8
-
-
33751052185
-
Static detection of malicious code in executable programs
-
J. Bergeron, M. Debbabi, J. Desharnais, M. M. Erhioui, Y. Lavoie, and N. Tawbi. Static detection of malicious code in executable programs. Symposium on Requirements Engineering for Information Security (SREIS'01), 2001.
-
(2001)
Symposium on Requirements Engineering for Information Security (SREIS'01)
-
-
Bergeron, J.1
Debbabi, M.2
Desharnais, J.3
Erhioui, M.M.4
Lavoie, Y.5
Tawbi, N.6
-
10
-
-
0004246220
-
-
PhD thesis, University of Southern California
-
F. Cohen. Computer Viruses. PhD thesis, University of Southern California, 1985.
-
(1985)
Computer Viruses
-
-
Cohen, F.1
-
12
-
-
0029488806
-
Mcf: A malicious code filter
-
R. W. Lo, K. N. Levitt, and R. A. Olsson. Mcf: A malicious code filter. Computers and Security, 14(6):541-566, 1995.
-
(1995)
Computers and Security
, vol.14
, Issue.6
, pp. 541-566
-
-
Lo, R.W.1
Levitt, K.N.2
Olsson, R.A.3
-
13
-
-
34247098898
-
Detecting unknown computer viruses - a new approach -
-
A. Mori. Detecting unknown computer viruses - a new approach -. Lecture Notes in Computer Science, pages 226-241, 2004.
-
(2004)
Lecture Notes in Computer Science
, pp. 226-241
-
-
Mori, A.1
-
14
-
-
18844437024
-
Detection of injected, dynamically generated, and obfuscated malicious code
-
J. C. Rabek, R. I. Khazan, S. M. Lewandowski, and R. K. Cunningham. Detection of injected, dynamically generated, and obfuscated malicious code. In Proceedings of the 2003 ACM Workshop on Rapid Malcode, pages 76-82, 2003.
-
(2003)
Proceedings of the 2003 ACM Workshop on Rapid Malcode
, pp. 76-82
-
-
Rabek, J.C.1
Khazan, R.I.2
Lewandowski, S.M.3
Cunningham, R.K.4
-
15
-
-
0034838197
-
Data mining methods for detection of new malicious executables
-
M. G. Schultz, E. Eskin, E. Zadok, and S. J. Stolfo. Data mining methods for detection of new malicious executables. In Proceedings of the IEEE Symposium on Security and Privacy, pages 38-49, 2001.
-
(2001)
Proceedings of the IEEE Symposium on Security and Privacy
, pp. 38-49
-
-
Schultz, M.G.1
Eskin, E.2
Zadok, E.3
Stolfo, S.J.4
-
16
-
-
21644475665
-
Static analyzer of vicious executables
-
A. H. Sung, J. Xu, P. Chavez, and S.Mukkamala. Static analyzer of vicious executables. In 20th Annual Computer Security Applications Conference, pages 326-334, 2004.
-
(2004)
20th Annual Computer Security Applications Conference
, pp. 326-334
-
-
Sung, A.H.1
Xu, J.2
Chavez, P.3
Mukkamala, S.4
-
17
-
-
0011544663
-
Understanding heuristics: Symantec's bloodhound technology
-
Technical report, Symantec Corporation
-
Symantec. Understanding heuristics: Symantec's bloodhound technology. Technical report, Symantec Corporation, 1997.
-
(1997)
-
-
Symantec1
-
19
-
-
78149352887
-
A toolkit for detecting and analyzing malicious software
-
M. Weber, M. Schmid, M. Schatz, and D. Geyer. A toolkit for detecting and analyzing malicious software. In Proceedings of the 18th Annual Computer Security Applications Conference, page 423, 2002.
-
(2002)
Proceedings of the 18th Annual Computer Security Applications Conference
, pp. 423
-
-
Weber, M.1
Schmid, M.2
Schatz, M.3
Geyer, D.4
|