-
1
-
-
38149089416
-
-
Springer-Verlag, LNCS4637
-
M. Bailey, J. Oberheide, J. Andersen, Z.M. Mao, F. Jahanian, and J. Nazario, Automated classification and analysis of Internet malware. Springer-Verlag, LNCS4637, 178-197, 2007.
-
(2007)
Automated classification and analysis of Internet malware
, pp. 178-197
-
-
Bailey, M.1
Oberheide, J.2
Andersen, J.3
Mao, Z.M.4
Jahanian, F.5
Nazario, J.6
-
3
-
-
33748932391
-
Dynamic analysis of malicious code
-
U. Bayer, A. Moser, C. Kruegel and E. Kirda: Dynamic analysis of malicious code. Journal in Computer Virology, vol 2, pp. 67-77, 2006.
-
(2006)
Journal in Computer Virology
, vol.2
, pp. 67-77
-
-
Bayer, U.1
Moser, A.2
Kruegel, C.3
Kirda, E.4
-
4
-
-
77950137996
-
-
Accessed on June 12, 2008
-
E. Carrera. 4x5: Reverse engineering automation with python, 2007. https://www.blackhat.com/presentations/bh-usa-07/Carrera/Presentation/ bhusa-07-carrera.pdf. pp. 2632, Accessed on June 12, 2008.
-
(2007)
4x5: Reverse engineering automation with python
-
-
Carrera, E.1
-
8
-
-
54849414050
-
An automated virus classification system
-
October
-
M. Gheorghescu, An automated virus classification system. In Virus Bulletin Conference October 2005, pp. 294300, 2005.
-
(2005)
Virus Bulletin Conference
-
-
Gheorghescu, M.1
-
9
-
-
58149090561
-
Binary feature extraction and comparison
-
Auckland, December
-
A. Kapoor and J. Spurlock. Binary feature extraction and comparison. In Presentation at AVAR 2006, Auckland, December 35, 2006.
-
(2006)
Presentation at AVAR 2006
, vol.35
-
-
Kapoor, A.1
Spurlock, J.2
-
11
-
-
34249057779
-
Analysis of computer intrusions using sequences of function calls
-
S. Peisert, M. Bishop, S. Karin, and K. Marzullo. Analysis of computer intrusions using sequences of function calls. In IEEE Transactions on dependable and secure computing, vol 4, pp. 315, 2007.
-
(2007)
IEEE Transactions on dependable and secure computing
, vol.4
, pp. 315
-
-
Peisert, S.1
Bishop, M.2
Karin, S.3
Marzullo, K.4
-
12
-
-
49949090311
-
Learning and classification of malware behavior
-
K. Rieck, T. Holz, C. Willems, P. Dussel and P. Laskov. Learning and classification of malware behavior. Springer-Verlag, LNCS 5137, pp. 108-125, 2008.
-
(2008)
Springer-Verlag, LNCS
, vol.5137
, pp. 108-125
-
-
Rieck, K.1
Holz, T.2
Willems, C.3
Dussel, P.4
Laskov, P.5
-
13
-
-
77950130808
-
-
S. Sathyanarayan, P. Kohli, and B. Bruhadeshwar. Signature generation and detection of malware families. In ACISP 2008. Springer LNCS, 2008.
-
S. Sathyanarayan, P. Kohli, and B. Bruhadeshwar. Signature generation and detection of malware families. In ACISP 2008. Springer LNCS, 2008.
-
-
-
-
14
-
-
72749091289
-
Are evolutionary rule learning algorithms appropriate for malware detection?
-
ACM
-
Z. Shafiq, M. Tabish and M. Farooq. Are evolutionary rule learning algorithms appropriate for malware detection? In Proceedings of GECCO09, ACM. 2009.
-
(2009)
Proceedings of GECCO09
-
-
Shafiq, Z.1
Tabish, M.2
Farooq, M.3
-
16
-
-
58149093760
-
Function Length as a Tool for Malware Classification
-
R. Tian, L.M. Batten and S.C. Versteeg, Function Length as a Tool for Malware Classification, Malware, 2008.
-
(2008)
Malware
-
-
Tian, R.1
Batten, L.M.2
Versteeg, S.C.3
-
18
-
-
77950185734
-
Scalability, fidelity, and containment in the potemkin virtual honeyfarm
-
M. Vrable, J. Ma, J. Chen, D. Moore, E. Vandekieft, A.C. Snoeren, G.M. Voelker and S.Savage. Scalability, fidelity, and containment in the potemkin virtual honeyfarm. SIGOPS Oper. Syst. Rev. 39(5), 148162, 2005.
-
(2005)
SIGOPS Oper. Syst. Rev
, vol.39
, Issue.5
, pp. 148162
-
-
Vrable, M.1
Ma, J.2
Chen, J.3
Moore, D.4
Vandekieft, E.5
Snoeren, A.C.6
Voelker, G.M.7
Savage, S.8
|