-
1
-
-
71549140753
-
-
Bayer, U., Kruegel, C., Kirda, E.: TTAnalyze: A Tool for Analyzing Malware. In: Proceedings of the Annual Conference of the European Institute for Computer Antivirus Research (2006)
-
Bayer, U., Kruegel, C., Kirda, E.: TTAnalyze: A Tool for Analyzing Malware. In: Proceedings of the Annual Conference of the European Institute for Computer Antivirus Research (2006)
-
-
-
-
2
-
-
78049387622
-
A Layered Architecture for Detecting Malicious Behaviors
-
Martignoni, L., Stinson, E., Fredrikson, M., Jha, S., Mitchell, J.C.: A Layered Architecture for Detecting Malicious Behaviors. In: Proceedings of the International Symposium on Recent Advances in Intrusion Detection (2008)
-
(2008)
Proceedings of the International Symposium on Recent Advances in Intrusion Detection
-
-
Martignoni, L.1
Stinson, E.2
Fredrikson, M.3
Jha, S.4
Mitchell, J.C.5
-
3
-
-
77950788046
-
Panorama: Capturing Systemwide Information Flow for Malware Detection and Analysis
-
Yin, H., Song, D., Egele, M., Kirda, E., Kruegel, C.: Panorama: Capturing Systemwide Information Flow for Malware Detection and Analysis. In: Proceedings of the Conference on Computer and Communications Security (2007)
-
(2007)
Proceedings of the Conference on Computer and Communications Security
-
-
Yin, H.1
Song, D.2
Egele, M.3
Kirda, E.4
Kruegel, C.5
-
4
-
-
84869669727
-
-
NovaShield: http://www.novashield.com/
-
NovaShield
-
-
-
5
-
-
84869689202
-
-
Panda Security: True Prevent, http://research.pandasecurity.com/archive/ How-TruPrevent-Works--2800-I-2900-.aspx
-
Panda Security: True Prevent
-
-
-
6
-
-
84869667852
-
-
Sana Security: http://www.sanasecurity.com/
-
Sana Security
-
-
-
8
-
-
34548772699
-
Towards Automatically Identifying Trigger-based Behavior in Malware using Symbolic Execution and Binary Analysis
-
Technical Report CMU-CS-07-105, Carnegie Mellon University
-
Brumley, D., Hartwig, C., Liang, Z., Newsome, J., Song, D., Yin, H.: Towards Automatically Identifying Trigger-based Behavior in Malware using Symbolic Execution and Binary Analysis. Technical Report CMU-CS-07-105, Carnegie Mellon University (2007)
-
(2007)
-
-
Brumley, D.1
Hartwig, C.2
Liang, Z.3
Newsome, J.4
Song, D.5
Yin, H.6
-
10
-
-
77957797161
-
Parallelizing security checks on commodity hardware
-
Nightingale, E.B., Peek, D., Chen, P.M., Flinn, J.: Parallelizing security checks on commodity hardware. In: Proceedings of the international Conference on Architectural Support for Programming Languages and Operating Systems (2008)
-
(2008)
Proceedings of the international Conference on Architectural Support for Programming Languages and Operating Systems
-
-
Nightingale, E.B.1
Peek, D.2
Chen, P.M.3
Flinn, J.4
-
11
-
-
34748845128
-
Practical Taint-based Protection Using Demand Emulation
-
Ho, A., Fetterman, M., Clark, C., Warfield, A., Hand, S.: Practical Taint-based Protection Using Demand Emulation. In: Proceedings of the EuroSys Conference (2006)
-
(2006)
Proceedings of the EuroSys Conference
-
-
Ho, A.1
Fetterman, M.2
Clark, C.3
Warfield, A.4
Hand, S.5
-
13
-
-
71549164714
-
-
NoAH Consortium: Containment environment design. Technical report, European Network of Affined Honeypots (2006)
-
NoAH Consortium: Containment environment design. Technical report, European Network of Affined Honeypots (2006)
-
-
-
-
14
-
-
85084162735
-
A Secure Environment for Untrusted Helper Applications
-
Goldberg, I., Wagner, D., Thomas, R., Brewer, E.A.: A Secure Environment for Untrusted Helper Applications. In: Proceedings of the USENIX Security Symposium (1996)
-
(1996)
Proceedings of the USENIX Security Symposium
-
-
Goldberg, I.1
Wagner, D.2
Thomas, R.3
Brewer, E.A.4
-
18
-
-
84969564072
-
One-way Isolation: An Effective Approach for Realizing Safe Execution Environments
-
Sun, W., Liang, Z., Sekar, R., Venkatakrishnan, V.N.: One-way Isolation: An Effective Approach for Realizing Safe Execution Environments. In: Proceedings of the Symposium on Network and Distributed Systems Security (2005)
-
(2005)
Proceedings of the Symposium on Network and Distributed Systems Security
-
-
Sun, W.1
Liang, Z.2
Sekar, R.3
Venkatakrishnan, V.N.4
-
20
-
-
85156147536
-
Impeding Malware Analysis Using Conditional Code Obfuscation
-
Sharif, M., Lanzi, A., Giffin, J., Lee, W.: Impeding Malware Analysis Using Conditional Code Obfuscation. In: Proceedings of the Annual Network and Distributed System Security Symposium (2008)
-
(2008)
Proceedings of the Annual Network and Distributed System Security Symposium
-
-
Sharif, M.1
Lanzi, A.2
Giffin, J.3
Lee, W.4
-
21
-
-
67650803219
-
An Analysis of Conficker's Logic and Rendezvous Points
-
Technical report, SRI International
-
Porras, P., Saidi, H., Yegneswaran, V.: An Analysis of Conficker's Logic and Rendezvous Points. Technical report, SRI International (2009)
-
(2009)
-
-
Porras, P.1
Saidi, H.2
Yegneswaran, V.3
-
22
-
-
70349240080
-
Ether: Malware Analysis via Hardware Virtualization Extensions
-
Dinaburg, A., Royal, P., Sharif, M., Lee,W.: Ether: Malware Analysis via Hardware Virtualization Extensions. In: Proceedings of the Conference on Computer and communications security (2008)
-
(2008)
Proceedings of the Conference on Computer and communications security
-
-
Dinaburg, A.1
Royal, P.2
Sharif, M.3
Lee, W.4
-
24
-
-
71549159549
-
-
Panda Security: From Traditional Antivirus to Collective Intelligence (2007)
-
Panda Security: From Traditional Antivirus to Collective Intelligence (2007)
-
-
-
-
26
-
-
19944369300
-
-
SPEEDUP Journal
-
Livny, M., Basney, J., Raman, R., Tannenbaum, T.: Mechanisms for High Throughput Computing. SPEEDUP Journal (1997)
-
(1997)
Mechanisms for High Throughput Computing
-
-
Livny, M.1
Basney, J.2
Raman, R.3
Tannenbaum, T.4
-
27
-
-
84869688710
-
-
VirtualSquare: Remote System Call, http://wiki.virtualsquare.org/index. php/Remote-System-Call
-
Remote System Call
-
-
|