-
2
-
-
79953672829
-
Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software
-
Newsome, J., Song, D.: Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software. In: Proc. of the Network and Distributed System Security Symposium, NDSS (2005)
-
(2005)
Proc. of the Network and Distributed System Security Symposium, NDSS
-
-
Newsome, J.1
Song, D.2
-
3
-
-
33751039507
-
Dataflow anomaly detection
-
Bhatkar, S., Chaturvedi, A., Sekar, R.: Dataflow anomaly detection. In: Proc. of the IEEE Symposium on Security and Privacy (SSP), pp. 48-62 (2006)
-
(2006)
Proc. of the IEEE Symposium on Security and Privacy (SSP)
, pp. 48-62
-
-
Bhatkar, S.1
Chaturvedi, A.2
Sekar, R.3
-
4
-
-
37849017546
-
Mining specifications of malicious behaviour
-
Christodorescu, M., Jha, S., Kruegel, C.: Mining specifications of malicious behaviour. In: Proc. of the 6th joint meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineeering, pp. 5-14 (2007)
-
(2007)
Proc. of the 6th joint meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineeering
, pp. 5-14
-
-
Christodorescu, M.1
Jha, S.2
Kruegel, C.3
-
6
-
-
56549121841
-
-
Martignoni, L., Stinson, E., Fredrikson, M., Jha, S., Mitchell, J.C.: A layered architecture for detecting malicious behaviors. In: Lippmann, R., Kirda, E., Trachtenberg, A. (eds.) RAID 2008. LNCS, 5230, pp. 78-97. Springer, Heidelberg (2008)
-
Martignoni, L., Stinson, E., Fredrikson, M., Jha, S., Mitchell, J.C.: A layered architecture for detecting malicious behaviors. In: Lippmann, R., Kirda, E., Trachtenberg, A. (eds.) RAID 2008. LNCS, vol. 5230, pp. 78-97. Springer, Heidelberg (2008)
-
-
-
-
7
-
-
0001538613
-
Semantics of context-free grammars
-
Knuth, D.E.: Semantics of context-free grammars. Theory of Computing Systems 2, 127-145 (1968)
-
(1968)
Theory of Computing Systems
, vol.2
, pp. 127-145
-
-
Knuth, D.E.1
-
8
-
-
48349094830
-
Malwares as interactive machines: A new framework for behavior modelling
-
Jacob, G., Filiol, E., Debar, H.: Malwares as interactive machines: A new framework for behavior modelling. Journal in Computer Virology 4(3), 235-250 (2008)
-
(2008)
Journal in Computer Virology
, vol.4
, Issue.3
, pp. 235-250
-
-
Jacob, G.1
Filiol, E.2
Debar, H.3
-
9
-
-
76649087489
-
-
Journal in Computer Virology Online
-
Jacob, G., Filiol, E., Debar, H.: Functional polymorphic engines: Formalisation, implementation and use cases. Journal in Computer Virology Online (2008)
-
(2008)
Functional polymorphic engines: Formalisation, implementation and use cases
-
-
Jacob, G.1
Filiol, E.2
Debar, H.3
-
10
-
-
76649096504
-
Orange Book
-
US Department of Defense:, Rainbow Series
-
US Department of Defense: "Orange Book" - Trusted Computer System Evaluation Criteria. Rainbow Series (1983)
-
(1983)
Trusted Computer System Evaluation Criteria
-
-
-
12
-
-
0142157009
-
On the detection of anomalous system call arguments
-
Snekkenes, E, Gollmann, D, eds, ESORICS 2003, Springer, Heidelberg
-
Kruegel, C., Mutz, D., Valeur, F., Vigna, G.: On the detection of anomalous system call arguments. In: Snekkenes, E., Gollmann, D. (eds.) ESORICS 2003. LNCS, vol. 2808, pp. 326-343. Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2808
, pp. 326-343
-
-
Kruegel, C.1
Mutz, D.2
Valeur, F.3
Vigna, G.4
-
16
-
-
76649114510
-
-
QEMU: Processor emulator, http://fabrice.bellard.free.fr/qemu/
-
QEMU: Processor emulator, http://fabrice.bellard.free.fr/qemu/
-
-
-
-
20
-
-
76649143553
-
-
OffensiveComputing: Repository, http://www.offensivecomputing.net/
-
Repository
-
-
-
21
-
-
76649091758
-
Malware - behavior, tools, scripting and advanced analysis
-
Carrera, E.: Malware - behavior, tools, scripting and advanced analysis. In: HITBSec Conf. (2008)
-
(2008)
HITBSec Conf
-
-
Carrera, E.1
|