-
2
-
-
33646414637
-
-
Feb 3. Chap 11, [Online] Available
-
Peter Szor (2005, Feb 3). "Art of Computer Virus Research and Defence", Chap 11, [Online] Available: http://safari.oreilly.com/ 0321304543/ch15lev1sec4.
-
(2005)
Art of Computer Virus Research and Defence
-
-
Szor, P.1
-
3
-
-
70349127450
-
Botnet Tracking: Tools Techniques and Lessons Learned
-
presented at
-
Dr. Jose Nazairo, "Botnet Tracking: Tools Techniques and Lessons Learned", presented at Lockdown 2007 University of Wisconsin-Madison, page 12.
-
Lockdown 2007 University of Wisconsin-Madison
, pp. 12
-
-
Nazairo, J.1
-
4
-
-
70349156540
-
Counterattacking the packers
-
presented at
-
Gaith Taha, "Counterattacking the packers", presented at AVAR 2007 Conference in Seoul, page 1.
-
AVAR 2007 Conference in Seoul
, pp. 1
-
-
Taha, G.1
-
5
-
-
57949115209
-
Covert Debugging: Circumventing Software Armoring Techniques
-
presented at
-
Danny Quist and Valsmith, "Covert Debugging: Circumventing Software Armoring Techniques", presented at Black Hat Briefings USA August 2007, page 1-2.
-
Black Hat Briefings USA August 2007
, pp. 1-2
-
-
Quist, D.1
Valsmith2
-
6
-
-
70349135230
-
Decompression of run-time compressed PE-files
-
presented at Slovak University of Technology, Faculty of Informatics and Information Technologies
-
Miroslav Vnuk and Pavol Navrat, "Decompression of run-time compressed PE-files.", presented at IIT.SRC 2006 - Student Research Conference, Slovak University of Technology, Faculty of Informatics and Information Technologies, page 2-4.
-
IIT.SRC 2006 - Student Research Conference
, pp. 2-4
-
-
Vnuk, M.1
Navrat, P.2
-
8
-
-
70349121456
-
-
Edith Cowan University, Mount Lawley Campus [Online] Available
-
rd December 2007, Edith Cowan University, Mount Lawley Campus. Page 67, [Online] Available: http://scissec.scis.ecu.edu.au/conference-proceedings/ 2007/forensics/00-Forensics2007-Complete-Proceedings.pdf
-
rd December 2007
, pp. 67
-
-
-
9
-
-
70349143795
-
File Analysis
-
US Patent US 2004/0236884 A1, Nov. 25, 2004
-
Andreas Beetz, "File Analysis", US Patent US 2004/0236884 A1, Nov. 25, 2004.
-
-
-
Beetz, A.1
-
10
-
-
35349006204
-
Software Transformations to Improve Malware Detection
-
November
-
Mihai Christodorescu, Somesh Jha, Johannes Kinder, Stefan Katzenbeisser and Helmut Veith, "Software Transformations to Improve Malware Detection" In Journal in Computer Virology, vol.3, (4): pp. 253-265, November 2007.
-
(2007)
Journal in Computer Virology
, vol.3
, Issue.4
, pp. 253-265
-
-
Christodorescu, M.1
Jha, S.2
Kinder, J.3
Katzenbeisser, S.4
Veith, H.5
-
11
-
-
38449103221
-
-
Diplomarbeit, Technische Universität München
-
Johannes Kinder , "Model Checking Malicious Code", Diplomarbeit, Technische Universität München, 2005.
-
(2005)
Model Checking Malicious Code
-
-
Kinder, J.1
-
13
-
-
70349140694
-
-
Jan.
-
Raymond J. Canzanese, Matthew Oyer, Spiros Mancoridis and Moshe Kam, "A Survey of Reverse Engineering Tools for the 32-Bit Microsoft Windows Environment", Jan. 2005, page 17-20.
-
(2005)
A Survey of Reverse Engineering Tools for the 32-Bit Microsoft Windows Environment
, pp. 17-20
-
-
Canzanese, R.J.1
Oyer, M.2
Mancoridis, S.3
Kam, M.4
-
15
-
-
33748932391
-
Dynamic Analysis of Malicious Code
-
page 2-5
-
Ulrich Bayer, Andreas Moser, Christopher Kruegel and Engin Kirda, "Dynamic Analysis of Malicious Code", in Journal in Computer Virology 2(1): 67-77 (2006), page 2-5.
-
(2006)
Journal in Computer Virology
, vol.2
, Issue.1
, pp. 67-77
-
-
Bayer, U.1
Moser, A.2
Kruegel, C.3
Kirda, E.4
-
16
-
-
70349122266
-
Generic Unpacking How to handle modified or unknown PE Compression Engines
-
presented at
-
Tobias Graf, "Generic Unpacking How to handle modified or unknown PE Compression Engines" presented at Virus. Bulletin Conference 2005.
-
Virus. Bulletin Conference 2005
-
-
Graf, T.1
-
20
-
-
70349099745
-
-
[Online] Available
-
Norman SandBox Whitepaper, [Online] Available: http://www.norman.com/ Download/White-papers/en, page 14.
-
-
-
-
25
-
-
70349127021
-
Anti-unpack Tricks in Malicious Code
-
Security Labs, Websense Inc. presented in
-
Xiaodong Tan, "Anti-unpack Tricks in Malicious Code", Security Labs, Websense Inc. presented in AVAR 2007, Seoul. Page 5-29.
-
AVAR 2007, Seoul
, pp. 5-29
-
-
Tan, X.1
-
30
-
-
70349138178
-
-
PECompact2
-
Bitsum Technologies. PECompact2. http://www.bitsum.com/pec2.asp.
-
-
-
-
31
-
-
70349151080
-
-
Obsidium Software
-
Obsidium Software, http://www.obsidium.de/show.php?home
-
-
-
-
32
-
-
70349141938
-
-
Teggo. MoleBox Pro
-
Teggo. MoleBox Pro, http://www.molebox.com/download.shtml
-
-
-
-
33
-
-
70349150270
-
-
Silicon Realms Toolworks. Armadillo
-
Silicon Realms Toolworks. Armadillo,
-
-
-
|