-
2
-
-
70849115826
-
-
VX Heavens. http://vx.netlux.org/.
-
VX Heavens
-
-
-
4
-
-
84880262565
-
QEMU, a fast and portable dynamic translator
-
F. Bellard. QEMU, a fast and portable dynamic translator. In ATEC'05.
-
ATEC'05
-
-
Bellard, F.1
-
7
-
-
27544433210
-
Semantics-aware malware detection
-
M. Christodorescu, S. Jha, S. A. Seshia, D. Song, and R. E. Bryant. Semantics-aware malware detection. In SP'05, 2005.
-
(2005)
SP'05
-
-
Christodorescu, M.1
Jha, S.2
Seshia, S.A.3
Song, D.4
Bryant, R.E.5
-
10
-
-
70849096853
-
Structural comparison of executable objects
-
H. Flake. Structural comparison of executable objects. In DIMVA'04.
-
DIMVA'04
-
-
Flake, H.1
-
11
-
-
84873191881
-
Semantic diff: A tool for summarizing the effects of modifications
-
D. Jackson and D. A. Ladd. Semantic diff: A tool for summarizing the effects of modifications. In ICSM'94.
-
ICSM'94
-
-
Jackson, D.1
Ladd, D.A.2
-
12
-
-
21644451617
-
Detecting kernellevel rootkits through binary analysis
-
C. Kruegel, W. Robertson, and G. Vigna. Detecting kernellevel rootkits through binary analysis. ACSAC'04.
-
ACSAC'04
-
-
Kruegel, C.1
Robertson, W.2
Vigna, G.3
-
13
-
-
84886436117
-
Identification of program modifications and its applications in software maintenance
-
J. Laski and W. Szermer. Identification of program modifications and its applications in software maintenance. CSM'92.
-
CSM'92
-
-
Laski, J.1
Szermer, W.2
-
14
-
-
77950315563
-
Design and implementation of an isolated sandbox with mimetic internet used to analyze malwares
-
S. Miwa, T. Miyachi, M. Eto, M. Yoshizumi, and Y. Shinoda. Design and implementation of an isolated sandbox with mimetic internet used to analyze malwares. In DETER 2007.
-
(2007)
DETER
-
-
Miwa, S.1
Miyachi, T.2
Eto, M.3
Yoshizumi, M.4
Shinoda, Y.5
-
15
-
-
0023012946
-
An o(nd) difference algorithm and its variations
-
E. W. Myers. An o(nd) difference algorithm and its variations. Algorithmica, 1986.
-
(1986)
Algorithmica
-
-
Myers, E.W.1
-
16
-
-
0030736223
-
Computer virus-antivirus coevolution
-
C. Nachenberg. Computer virus-antivirus coevolution. Commun. ACM, 1997.
-
(1997)
Commun. ACM
-
-
Nachenberg, C.1
-
20
-
-
50249114395
-
Automated detection of persistent kernel control-flow attacks
-
N. L. Petroni and M. Hicks. Automated detection of persistent kernel control-flow attacks. In CCS'07.
-
CCS'07
-
-
Petroni, N.L.1
Hicks, M.2
-
21
-
-
0002383096
-
The use of program pro-ling for software maintenance with applications to the year 2000 problem
-
T. Reps, T. Ball, M. Das, and J. Larus. The use of program pro-ling for software maintenance with applications to the year 2000 problem. SIGSOFT Softw. Eng. Notes, 1997.
-
(1997)
SIGSOFT Softw. Eng. Notes
-
-
Reps, T.1
Ball, T.2
Das, M.3
Larus, J.4
-
24
-
-
26844575083
-
Faster reuse and maintenance using software reconnaissance
-
SERC, Univ. of Florida, CIS Department
-
N. Wilde. Faster reuse and maintenance using software reconnaissance. Technical Report SERC-TR-75F, SERC, Univ. of Florida, CIS Department, 1994.
-
(1994)
Technical Report SERC-TR-75F
-
-
Wilde, N.1
-
25
-
-
77950788046
-
Panorama: Capturing system-wide information flow for malware detection and analysis
-
H. Yin, D. Song, M. Egele, C. Kruegel, and E. Kirda. Panorama: Capturing system-wide information flow for malware detection and analysis. In CCS'07.
-
CCS'07
-
-
Yin, H.1
Song, D.2
Egele, M.3
Kruegel, C.4
Kirda, E.5
|