-
1
-
-
70349988810
-
-
http://udis86.sourceforge.net.
-
-
-
-
2
-
-
70349992922
-
-
http://vx.netlux.org.
-
-
-
-
3
-
-
70349988811
-
-
http://www.clamav.net.
-
-
-
-
4
-
-
33947609379
-
On the possibility of practically obfuscating programs towards a unified perspective of code protection
-
Beaucamps Ph., Filiol E.: On the possibility of practically obfuscating programs towards a unified perspective of code protection. J. Comput. Virol. 3(1), 3-21 (2007).
-
(2007)
J. Comput. Virol.
, vol.3
, Issue.1
, pp. 3-21
-
-
Beaucamps, P.1
Filiol, E.2
-
5
-
-
70349985737
-
-
Bonfante, G., Kaczmarek, M., Marion, J.Y.: Control Flow Graphs as Malware Signatures. WTCV, May (2007)
-
Bonfante, G., Kaczmarek, M., Marion, J.Y.: Control Flow Graphs as Malware Signatures. WTCV, May (2007).
-
-
-
-
6
-
-
70349995324
-
-
Bruschi, D., Martignoni, L., Monga, M.: Detecting self-mutating malware using control-flow graph matching. Technical report, Università degli Studi di Milano, September (2006)
-
Bruschi, D., Martignoni, L., Monga, M.: Detecting self-mutating malware using control-flow graph matching. Technical report, Università degli Studi di Milano, September (2006).
-
-
-
-
8
-
-
35349006204
-
Software transformations to improve malware detection
-
Christodorescu M., Jha S., Kinder J., Katzenbeisser S., Veith H.: Software transformations to improve malware detection. J. Comput. Virol. 3(4), 253-265 (2007).
-
(2007)
J. Comput. Virol.
, vol.3
, Issue.4
, pp. 253-265
-
-
Christodorescu, M.1
Jha, S.2
Kinder, J.3
Katzenbeisser, S.4
Veith, H.5
-
9
-
-
27544433210
-
-
Christodorescu, M., Jha, S., Seshia, S.A., Song, D., Bryant, R.E.: Semantics-aware malware detection. In: IEEE Symposium on Security and Privacy (2005)
-
Christodorescu, M., Jha, S., Seshia, S.A., Song, D., Bryant, R.E.: Semantics-aware malware detection. In: IEEE Symposium on Security and Privacy (2005).
-
-
-
-
10
-
-
70349997021
-
-
Comon, H., Dauchet, M., Gilleron, R., Jacquemard, F., Lugiez, D., Tison, S., Tommasi, M.: Tree automata techniques and applications, 10, (1997). Available on
-
Comon, H., Dauchet, M., Gilleron, R., Jacquemard, F., Lugiez, D., Tison, S., Tommasi, M.: Tree automata techniques and applications, 10, (1997). Available on: http://www.grappa.univ-lille3.fr/tata.
-
-
-
-
11
-
-
34548223126
-
-
Dalla Preda, M., Christodorescu, M., Jha, S., Debray, S.: A semantics-based approach to malware detection. In: POPL'07 (2007)
-
Dalla Preda, M., Christodorescu, M., Jha, S., Debray, S.: A semantics-based approach to malware detection. In: POPL'07 (2007).
-
-
-
-
14
-
-
70349978316
-
-
Filiol, E.: Malware pattern scanning schemes secure against black-box analysis. In: 15th EICAR (2006)
-
Filiol, E.: Malware pattern scanning schemes secure against black-box analysis. In: 15th EICAR (2006).
-
-
-
-
15
-
-
70349999943
-
-
Gryaznov, D.: Scanners of the Year 2000: Heuristics. Proceedings of the 5th International Virus Bulletin (1999)
-
Gryaznov, D.: Scanners of the Year 2000: Heuristics. Proceedings of the 5th International Virus Bulletin (1999).
-
-
-
-
16
-
-
70349997012
-
-
Kephart, J.O., Arnold, W.C.: Automatic extraction of computer virus signatures. In: Proceedings of the Fourth Virus Bulletin International Conference, pp. 178-184 (1994)
-
Kephart, J.O., Arnold, W.C.: Automatic extraction of computer virus signatures. In: Proceedings of the Fourth Virus Bulletin International Conference, pp. 178-184 (1994).
-
-
-
-
17
-
-
0034838197
-
-
Schultz, M.G., Eskin, E., Zadok, E., Stolfo, S.J.: Data mining methods for detection of new malicious executables. In: Proceedings of the IEEE Symposium on Security and Privacy, p. 38 (2001)
-
Schultz, M.G., Eskin, E., Zadok, E., Stolfo, S.J.: Data mining methods for detection of new malicious executables. In: Proceedings of the IEEE Symposium on Security and Privacy, p. 38 (2001).
-
-
-
-
18
-
-
70349988808
-
-
Ször, P.: The Art of Computer Virus Research and Defense. Addison-Wesley Professional, Reading (2005)
-
Ször, P.: The Art of Computer Virus Research and Defense. Addison-Wesley Professional, Reading (2005).
-
-
-
-
19
-
-
0030216542
-
Neural networks for computer virus recognition
-
Tesauro G.J., Kephart J.O., Sorkin G.B.: Neural networks for computer virus recognition. Expert, IEEE (see also IEEE Intell. Syst. Appl.) 11(4), 5-6 (1996).
-
(1996)
Expert, IEEE (See Also IEEE Intell. Syst. Appl.)
, vol.11
, Issue.4
, pp. 5-6
-
-
Tesauro, G.J.1
Kephart, J.O.2
Sorkin, G.B.3
-
20
-
-
34547197548
-
Normalizing metamorphic malware using term rewriting
-
Walenstein A., Mathur R., Chouchane M.R., Lakhotia A.: Normalizing metamorphic malware using term rewriting. SCAM 0, 75-84 (2006).
-
(2006)
SCAM
, vol.0
, pp. 75-84
-
-
Walenstein, A.1
Mathur, R.2
Chouchane, M.R.3
Lakhotia, A.4
|