-
2
-
-
58449115871
-
BitScope: Automatically dissecting malicious binaries. Technical Report
-
CMU -CS -07-133, School of Computer Science, Carnegie Mellon University, March
-
Brumley, D., Hartwig, C., Kang, M., Liang, Z., Newsome, J., Song, D., and Yin, H. BitScope: Automatically dissecting malicious binaries. Technical Report,Technical Report CMU -CS -07-133, School of Computer Science, Carnegie Mellon University, March 2007.
-
(2007)
Technical Report
-
-
Brumley, D.1
Hartwig, C.2
Kang, M.3
Liang, Z.4
Newsome, J.5
Song, D.6
Yin, H.7
-
4
-
-
50249182906
-
-
Grier, C., Tang, S., and King, S. Secure Web browsing with the OP Web browser. Security and Privacy, 2008. IE Symposium, 2008, 402416.
-
Grier, C., Tang, S., and King, S. Secure Web browsing with the OP Web browser. Security and Privacy, 2008. IE Symposium, 2008, 402416.
-
-
-
-
5
-
-
65949094219
-
-
Krebs, B. Internet Explorer unsafe for 284 days in 2006. Washington Post Online Blog, Jan. 2007.
-
Krebs, B. Internet Explorer unsafe for 284 days in 2006. Washington Post Online Blog, Jan. 2007.
-
-
-
-
7
-
-
65949101727
-
-
Microsoft. Microsoft Security Bulletin MS06-014: Vulnerability in the Microsoft Data Access Components (MDACS ) Function Could Allow Code Execution. May, 2006.
-
Microsoft. Microsoft Security Bulletin MS06-014: Vulnerability in the Microsoft Data Access Components (MDACS ) Function Could Allow Code Execution. May, 2006.
-
-
-
-
8
-
-
65949095280
-
-
Microsoft. Microsoft Security Advisory (935423): Vulnerability in Windows Animated Cursor Handling, Mar. 2007.
-
Microsoft. Microsoft Security Advisory (935423): Vulnerability in Windows Animated Cursor Handling, Mar. 2007.
-
-
-
-
9
-
-
34548737161
-
Exploring multiple execution paths for malware analysis
-
Moser, A., Kruegel, C., and Kirda, E. Exploring multiple execution paths for malware analysis. In Proceedings of the IEEE Symposium on Security and Privacy, 2007, 231245.
-
(2007)
Proceedings of the IEEE Symposium on Security and Privacy
, pp. 231245
-
-
Moser, A.1
Kruegel, C.2
Kirda, E.3
-
12
-
-
80053650188
-
All your IFRAMEs point to us
-
Provos, N., Mavrommatis, P., Rajab, M.A., and Monrose, F. All your IFRAMEs point to us. USENIX Security Symposium, 2008, 116.
-
(2008)
USENIX Security Symposium
, pp. 116
-
-
Provos, N.1
Mavrommatis, P.2
Rajab, M.A.3
Monrose, F.4
-
13
-
-
65949121003
-
Asprox silent defacement
-
Dec. 2008;
-
Raz, R. Asprox silent defacement. Chapters in Web Security, Dec. 2008; http://chaptersinWebsecurity.blogspot.com/2008/07/asprox-silent- defacement.html.
-
Chapters in Web Security
-
-
Raz, R.1
-
14
-
-
78651523935
-
To catch a predator: A natural language approach for eliciting malicious payloads
-
Small, S., Mason, J., Monrose, F., Provos, N., and Stubblefield, A. To catch a predator: A natural language approach for eliciting malicious payloads. USENIX Security Symposium, 2008, 171184.
-
(2008)
USENIX Security Symposium
, pp. 171184
-
-
Small, S.1
Mason, J.2
Monrose, F.3
Provos, N.4
Stubblefield, A.5
-
15
-
-
78651535219
-
Asprox SQL injection attack tool analysis
-
May 2008;
-
Stewart, J. Danmec/Asprox SQL injection attack tool analysis. Secure Works Online, May 2008; www.secureworks.com/research/threats/danmecasprox.
-
Secure Works Online
-
-
Stewart, J.D.1
|