-
1
-
-
33646867135
-
An In-Depth look into the win32 portable executable file format
-
March
-
Pietrek, M.: An In-Depth Look into the Win32 Portable Executable File Format, in MSDN Magazine (March 2002)
-
(2002)
MSDN Magazine
-
-
Pietrek, M.1
-
2
-
-
70349877364
-
-
VX Heavens
-
VX Heavens, http://vx.netlux.org
-
-
-
-
3
-
-
70349885926
-
-
Win32.Borzella
-
Viruslist.com - Email-Worm.Win32.Borzella, http://www.viruslist.com/en/ viruses/encyclopedia?virusid=21991
-
-
-
-
4
-
-
27544433210
-
Semantics- aware malware detection
-
May 08-11, 2005
-
Christodorescu, M., Jha, S., Seshia, S.A., Song, D., Bryant, R.E.: Semantics- Aware Malware Detection. In: Proceedings of the 2005 IEEE Symposium on Security and Privacy, May 08-11, 2005, pp. 32-46 (2005)
-
(2005)
Proceedings of the 2005 IEEE Symposium on Security and Privacy
, pp. 32-46
-
-
Christodorescu, M.1
Jha, S.2
Seshia, S.A.3
Song, D.4
Bryant, R.E.5
-
7
-
-
48649084773
-
OmniUnpack: Fast generic and safe unpacking of malware
-
December
-
Martignoni, L., Christodorescu, M., Jha, S.: OmniUnpack: Fast, Generic, and Safe Unpacking of Malware. In: Twenty-Third Annual Computer Security Applications Conference (ACSAC), Miami Beach, FL (December 2007)
-
(2007)
Twenty-Third Annual Computer Security Applications Conference (ACSAC) Miami Beach FL
-
-
Martignoni, L.1
Christodorescu, M.2
Jha, S.3
-
11
-
-
0023294949
-
Computer virus: Theory and experiments
-
Cohen, F.: Computer Virus: Theory and experiments. Computers and Security 6, 22-35 (1987)
-
(1987)
Computers and Security
, vol.6
, pp. 22-35
-
-
Cohen, F.1
-
16
-
-
85084160818
-
Static disassembly of obfuscated binaries
-
San Diego, CA August
-
Kruegel, C., Robertson, W., Valeur, F., Vigna, G.: Static disassembly of obfuscated binaries. In: Proceedings of USENIX Security, San Diego, CA, pp. 255-270 (August 2004)
-
(2004)
Proceedings of USENIX Security
, pp. 255-270
-
-
Kruegel, C.1
Robertson, W.2
Valeur, F.3
Vigna, G.4
-
18
-
-
33751052185
-
Static detection of malicious code in executable programs
-
Bergeron, J., Debbabi, M., Desharnais, J., Erhioui, M.M., Lavoie, Y., Tawbi, N.: Static Detection of Malicious Code in Executable Programs. In: Symposium on Requirements Engineering for Information Security (SREIS 2001) (2001)
-
(2001)
Symposium on Requirements Engineering for Information Security (SREIS 2001)
-
-
Bergeron, J.1
Debbabi, M.2
Desharnais, J.3
Erhioui, M.M.4
Lavoie, Y.5
Tawbi, N.6
-
19
-
-
26944454412
-
Using fuzzy pattern recognition to detect unknown malicious executables code
-
Wang, L., Jin, Y. (eds.) Fuzzy Systems and Knowledge Discovery. Springer, Heidelberg
-
Zhang, B., Yin, J., Hao, J.: Using Fuzzy Pattern Recognition to Detect Unknown Malicious Executables Code. In:Wang, L., Jin, Y. (eds.) Fuzzy Systems and Knowledge Discovery. LNCS (LNAI), vol.3613, pp. 629-634. Springer, Heidelberg (2005)
-
(2005)
LNCS (LNAI)
, vol.3613
, pp. 629-634
-
-
Zhang, B.1
Yin, J.2
Hao, J.3
-
20
-
-
34249057779
-
Analysis of computer intrusions using sequences of function calls
-
April-June
-
Peisert, S., Bishop, M., Karin, S., Marzullo, K.: Analysis of Computer Intrusions Using Sequences of Function Calls. IEEE Transactions on Dependable and Secure Computing (TDSC) 4(2) (April-June, 2007)
-
(2007)
IEEE Transactions on Dependable and Secure Computing (TDSC)
, vol.4
, Issue.2
-
-
Peisert, S.1
Bishop, M.2
Karin, S.3
Marzullo, K.4
-
21
-
-
84860833874
-
Static analysis of binary code to isolate malicious behaviors
-
June 16- 18 1999
-
Bergeron, J., Debbabi, M., Erhioui, M.M., Ktari, B.: Static Analysis of Binary Code to Isolate Malicious Behaviors. In: Proceedings of the 8th Workshop on Enabling Technologies on Infrastructure for Collaborative Enterprises, June 16- 18, 1999, pp. 184-189 (1999)
-
(1999)
Proceedings of the 8th Workshop on Enabling Technologies on Infrastructure for Collaborative Enterprises
, pp. 184-189
-
-
Bergeron, J.1
Debbabi, M.2
Erhioui, M.M.3
Ktari, B.4
-
22
-
-
33746340642
-
API monitoring system for defeating worms and exploits in MS-Windows system
-
Batten, L.M., Safavi-Naini, R. (eds.) ACISP 2006. Springer, Heidelberg
-
Sun, H.-M., Lin, Y.-H., Wu, M.-F.: API Monitoring System for Defeating Worms and Exploits in MS-Windows System. In: Batten, L.M., Safavi-Naini, R. (eds.) ACISP 2006. LNCS, vol.4058. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4058
-
-
Sun, H.-M.1
Lin, Y.-H.2
Wu, M.-F.3
-
23
-
-
18844437024
-
Detection of injected dynamically generatedand obfuscated malicious code
-
October
-
Jesse, C., Rabek, R., Khazan, I., Scott,M., Robert, L., Cunningham, K.: Detection of Injected, Dynamically Generated,and Obfuscated Malicious Code. In: Proc. of 2003 ACM workshop on Rapid Malcode (October 2003)
-
(2003)
Proc. of 2003 ACM Workshop on Rapid Malcode
-
-
Jesse, C.1
Rabek, R.2
Scottm., K.I.3
Robert, L.4
Cunningham, K.5
-
24
-
-
0029716418
-
A sense of self for unix processes
-
Forrest, S., Hofmeyr, S.A., Somayaji, A., Longsta., T.A.: A Sense of Self for Unix Processes. In: IEEE Symposium on Security and Privacy 1996 (1996)
-
(1996)
IEEE Symposium on Security and Privacy 1996
-
-
Forrest, S.1
Hofmeyr, S.A.2
Somayaji, A.3
Longsta, T.A.4
-
25
-
-
0034829697
-
A fast automaton-based method for detecting anomalous program behaviors
-
Sekar, R., Bendre, M., Dhurjati, D., Bollineni, P.: A Fast Automaton-Based Method for Detecting Anomalous Program Behaviors. In: IEEE Symposium on Security and Privacy (2001)
-
(2001)
IEEE Symposium on Security and Privacy
-
-
Sekar, R.1
Bendre, M.2
Dhurjati, D.3
Bollineni, P.4
-
26
-
-
34249057779
-
Analysis of computer intrusions using sequences of function calls
-
April-June
-
Peisert, S., Bishop, M., Karin, S., Marzullo, K.: Analysis of Computer Intrusions Using Sequences of Function Calls. IEEE Transactions On Dependable and Secure Computing 4(2) (April-June, 2007)
-
(2007)
IEEE Transactions on Dependable and Secure Computing
, vol.4
, Issue.2
-
-
Peisert, S.1
Bishop, M.2
Karin, S.3
Marzullo, K.4
-
27
-
-
70349879396
-
MetaAware: Identifying metamorphic malware
-
Choi, L., Paek, Y., Cho, S. (eds.) ACSAC 2007. Springer, Heidelberg
-
Zhang, Q., Reeves, D.S.: MetaAware: Identifying Metamorphic Malware. In: Choi, L., Paek, Y., Cho, S. (eds.) ACSAC 2007. LNCS, vol.4697, Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4697
-
-
Zhang, Q.1
Reeves, D.S.2
|