-
1
-
-
74049126777
-
-
Armadillo. http://www.siliconrealms.com/armadillo.htm, 2008.
-
(2008)
Armadillo
-
-
-
2
-
-
74049113076
-
-
Peid 0.95. http://www.peid.info/, 2008.
-
(2008)
Peid 0.95
-
-
-
3
-
-
74049128481
-
-
Trid v2.02. http://mark0.net/soft-trid-e.html, 2008.
-
(2008)
Trid v2.02
-
-
-
4
-
-
38149089416
-
Automated classification and analysis of internet malware
-
M. Bailey, J. Oberheide, J. Andersen, Z. M. Mao, F. Jahanian, and J. Nazario. Automated classification and analysis of internet malware. In RAID, pages 178-197, 2007.
-
(2007)
RAID
, pp. 178-197
-
-
Bailey, M.1
Oberheide, J.2
Andersen, J.3
Mao, Z.M.4
Jahanian, F.5
Nazario, J.6
-
5
-
-
85043201839
-
Scalable, Behavior-Based Malware Clustering
-
U. Bayer, P. Milani Comparetti, C. Hlauscheck, C. Kruegel, and E. Kirda. Scalable, Behavior-Based Malware Clustering. In 16th Symposium on Network and Distributed System Security, 2009.
-
(2009)
16th Symposium on Network and Distributed System Security
-
-
Bayer, U.1
Milani Comparetti, P.2
Hlauscheck, C.3
Kruegel, C.4
Kirda, E.5
-
6
-
-
0031162001
-
-
T. Bozkaya and M. Ozsoyoglu. Distance-based indexing for high-dimensional metric spaces. In In Proc. ACM SIGMOD International Conference on Management of Data, 1997.
-
T. Bozkaya and M. Ozsoyoglu. Distance-based indexing for high-dimensional metric spaces. In In Proc. ACM SIGMOD International Conference on Management of Data, 1997.
-
-
-
-
7
-
-
74049107976
-
-
I. Briones and A. Gomez. Graphs, entropy and grid computing: Automatic comparison of malware. In Proceedings of the 2004 Virus Bulletin Conference, 2004.
-
I. Briones and A. Gomez. Graphs, entropy and grid computing: Automatic comparison of malware. In Proceedings of the 2004 Virus Bulletin Conference, 2004.
-
-
-
-
8
-
-
74049098102
-
-
E. Carrera and G. Erdelyi. Digital genome mapping a̧ł advanced binary malware analysis. In Proceedings of the 2004 Virus Bulletin Conference, 2004.
-
E. Carrera and G. Erdelyi. Digital genome mapping a̧ł advanced binary malware analysis. In Proceedings of the 2004 Virus Bulletin Conference, 2004.
-
-
-
-
10
-
-
74049134163
-
A graph matching problem
-
IPAM Research in Industrial Projects for Students RIPS
-
S. Das, A. Mistry, D. Negoescu, G. Reed, and S. K. Singh. A graph matching problem. Techical report, IPAM Research in Industrial Projects for Students (RIPS), 2008.
-
(2008)
Techical report
-
-
Das, S.1
Mistry, A.2
Negoescu, D.3
Reed, G.4
Singh, S.K.5
-
12
-
-
56549090955
-
A study of the packer problem and its solutions
-
F. Guo, P. Ferrie, and T.-C. Chiueh. A study of the packer problem and its solutions. In RAID '08, pages 98-115, 2008.
-
(2008)
RAID '08
, pp. 98-115
-
-
Guo, F.1
Ferrie, P.2
Chiueh, T.-C.3
-
13
-
-
52349096066
-
Practical analysis of stripped binary code
-
L. C. Harris and B. P. Miller. Practical analysis of stripped binary code. SIGARCH Comput. Archit. News, 33(5):63-68, 2005.
-
(2005)
SIGARCH Comput. Archit. News
, vol.33
, Issue.5
, pp. 63-68
-
-
Harris, L.C.1
Miller, B.P.2
-
16
-
-
74049105789
-
Large-scale malware indexing using function-call graphs (extended)
-
Technical Report, Department of Computer Sicence, University of Michigan
-
X. Hu, T. cker Chiueh, and K. G. Shin. Large-scale malware indexing using function-call graphs (extended). Technical Report, Department of Computer Sicence, University of Michigan, 2009.
-
(2009)
-
-
Hu, X.1
cker Chiueh, T.2
Shin, K.G.3
-
18
-
-
33748193035
-
A binary linear programming formulation of the graph edit distance
-
Fellow-Hero, Alfred
-
D. Justice. A binary linear programming formulation of the graph edit distance. IEEE Trans. Pattern Anal. Mach. Intell., 28(8):1200-1214, 2006. Fellow-Hero,, Alfred.
-
(2006)
IEEE Trans. Pattern Anal. Mach. Intell
, vol.28
, Issue.8
, pp. 1200-1214
-
-
Justice, D.1
-
19
-
-
33845768389
-
Learning to detect and classify malicious executables in the wild
-
J. Z. Kolter and M. A. Maloof. Learning to detect and classify malicious executables in the wild. J. Mach. Learn. Res., 7:2721-2744, 2006.
-
(2006)
J. Mach. Learn. Res
, vol.7
, pp. 2721-2744
-
-
Kolter, J.Z.1
Maloof, M.A.2
-
20
-
-
33745670395
-
Polymorphic worm detection using structural information of executables
-
Springer-Verlag
-
C. Kruegel, E. Kirda, D. Mutz, W. Robertson, and G. Vigna. Polymorphic worm detection using structural information of executables. In In RAID, pages 207-226. Springer-Verlag, 2005.
-
(2005)
In RAID
, pp. 207-226
-
-
Kruegel, C.1
Kirda, E.2
Mutz, D.3
Robertson, W.4
Vigna, G.5
-
22
-
-
48649084773
-
-
L. Martignoni, M. Christodorescu, and S. Jha. Omniunpack: Fast, generic, and safe unpacking of malware. In In Proceedings of the Annual Computer Security Applications Conference ACSAC, 2007.
-
L. Martignoni, M. Christodorescu, and S. Jha. Omniunpack: Fast, generic, and safe unpacking of malware. In In Proceedings of the Annual Computer Security Applications Conference (ACSAC, 2007.
-
-
-
-
24
-
-
24644458373
-
An error-tolerant approximate matching algorithm for attributed planar graphs and its application to fingerprint classification
-
M. Neuhaus and H. Bunke. An error-tolerant approximate matching algorithm for attributed planar graphs and its application to fingerprint classification. In SSPR/SPR, pages 180-189, 2004.
-
(2004)
SSPR/SPR
, pp. 180-189
-
-
Neuhaus, M.1
Bunke, H.2
-
26
-
-
51249106006
-
Deobfuscator: An automated approach to the identification and removal of code obfuscation
-
J. Raber and E. Laspe. Deobfuscator: An automated approach to the identification and removal of code obfuscation. Reverse Engineering, Working Conference on, 0:275-276, 2007.
-
(2007)
Reverse Engineering, Working Conference on
, vol.0
, pp. 275-276
-
-
Raber, J.1
Laspe, E.2
-
27
-
-
49949090311
-
Learning and classification of malware behavior
-
K. Rieck, T. Holz, C. Willems, P. Düssel, and P. Laskov. Learning and classification of malware behavior. In DIMVA '08, pages 108-125, 2008.
-
(2008)
DIMVA '08
, pp. 108-125
-
-
Rieck, K.1
Holz, T.2
Willems, C.3
Düssel, P.4
Laskov, P.5
-
31
-
-
52649126146
-
Tale: A tool for approximate large graph matching
-
Y. Tian and J. M. Patel. Tale: A tool for approximate large graph matching. In ICDE, pages 963-972, 2008.
-
(2008)
ICDE
, pp. 963-972
-
-
Tian, Y.1
Patel, J.M.2
-
32
-
-
38149001240
-
-
T.Lee and J.J.Mody. Behavioral classification. http://www.microsoft.com/ downloads/details.aspx?FamilyID=7b5d8cc8-b336-4091-abb5- 2cc500a6c41a&displaylang=en,2006.
-
(2006)
Behavioral classification
-
-
Lee, T.1
Mody, J.J.2
-
35
-
-
0027188633
-
Data structures and algorithms for nearest neighbor search in general metric spaces
-
P. N. Yianilos. Data structures and algorithms for nearest neighbor search in general metric spaces. In SODA: ACM-SIAM Symposium on Discrete Algorithms, 1993.
-
(1993)
SODA: ACM-SIAM Symposium on Discrete Algorithms
-
-
Yianilos, P.N.1
-
37
-
-
46249119876
-
M-tree: A dynamic index for similarity queries in multimedia databases
-
Technical Report 7, HERMES ESPRIT LTR Project
-
P. Zezula, P. Ciaccia, and F. Rabitti. M-tree: A dynamic index for similarity queries in multimedia databases. Technical Report 7, HERMES ESPRIT LTR Project, 1996.
-
(1996)
-
-
Zezula, P.1
Ciaccia, P.2
Rabitti, F.3
-
38
-
-
0024889169
-
Simple fast algorithms for the editing distance between trees and related problems
-
K. Zhang and D. Shasha. Simple fast algorithms for the editing distance between trees and related problems. SIAM J. Comput., 18(6):1245-1262, 1989.
-
(1989)
SIAM J. Comput
, vol.18
, Issue.6
, pp. 1245-1262
-
-
Zhang, K.1
Shasha, D.2
|