-
1
-
-
33750376598
-
The nepenthes platform: An efficient approach to collect malware
-
P. Baecher, M. Koetter, T. Holz, M. Dornseif, and F.C. Freiling, "The nepenthes platform: An efficient approach to collect malware," 9th International Symposium on Recent Advances in Intrusion Detection (RAID 2006), pp.165-184, 2006.
-
(2006)
9th International Symposium on Recent Advances in Intrusion Detection (RAID 2006)
, pp. 165-184
-
-
Baecher, P.1
Koetter, M.2
Holz, T.3
Dornseif, M.4
Freiling, F.C.5
-
2
-
-
38149089416
-
Automated classification and analysis of Internet malware
-
M. Bailey, J. Oberheide, J. Andersen, Z.M. Mao, F. Jahanian, and J. Nazario, "Automated classification and analysis of Internet malware," Proc. Recent Advances in Intrusion Detection, RAID07, LNCS vol.4637, pp.178-197, 2007.
-
(2007)
Proc. Recent Advances in Intrusion Detection, RAID07, LNCS
, vol.4637
, pp. 178-197
-
-
Bailey, M.1
Oberheide, J.2
Andersen, J.3
Mao, Z.M.4
Jahanian, F.5
Nazario, J.6
-
4
-
-
53349116756
-
Towards an understanding of anti-virtualization and anti-debugging behavior in modern malware
-
X. Chen, J. Andersen, Z.M. Mao, M. Bailey, and J. Nazario, "Towards an understanding of anti-virtualization and anti-debugging behavior in modern malware," 38th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2008), 2008.
-
(2008)
38th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2008)
-
-
Chen, X.1
Andersen, J.2
Mao, Z.M.3
Bailey, M.4
Nazario, J.5
-
5
-
-
34047153756
-
Hooking windows API-Technics of hooking API functions on windows
-
H. Father, "Hooking windows API-Technics of hooking API functions on windows," CodeBreakers J., vol.1, no.2, 2004.
-
(2004)
CodeBreakers J.
, vol.1
, Issue.2
-
-
Father, H.1
-
6
-
-
51249117305
-
Malware behavior analysis in isolated miniature network for revealing malware's network activity
-
D. Inoue, K. Yoshioka, M. Eto, Y. Hoshizawa, and K. Nakao, "Malware behavior analysis in isolated miniature network for revealing malware's network activity," IEEE International Conference on Communications (ICC 2008), pp.1715-1721, 2008.
-
(2008)
IEEE International Conference on Communications (ICC 2008)
, pp. 1715-1721
-
-
Inoue, D.1
Yoshioka, K.2
Eto, M.3
Hoshizawa, Y.4
Nakao, K.5
-
7
-
-
77950315563
-
Design and implementation of an isolated sandbox with mimetic Internet used to analyze malwares
-
S. Miwa, T. Miyachi, M. Eto, M. Yoshizumi, and Y. Shinoda, "Design and implementation of an isolated sandbox with mimetic Internet used to analyze malwares," Proc. DETER Community Workshop on Cyber Security Experimentation and Test, 2007.
-
(2007)
Proc. DETER Community Workshop on Cyber Security Experimentation and Test
-
-
Miwa, S.1
Miyachi, T.2
Eto, M.3
Yoshizumi, M.4
Shinoda, Y.5
-
8
-
-
34547399387
-
A multifaceted approach to understanding the botnet phenomenon
-
M.A. Rajab, J. Zarfoss, F. Monrose, and A. Terzis, "A multifaceted approach to understanding the botnet phenomenon," Proc. 6th ACM SIGCOMM Conference on Internet Measurement, pp.41-52, 2006.
-
(2006)
Proc. 6th ACM SIGCOMM Conference on Internet Measurement
, pp. 41-52
-
-
M.A. Rajab1
Zarfoss, J.2
Monrose, F.3
Terzis, A.4
-
9
-
-
33750376717
-
Scalability, fidelity, and containment in the potemkin virtual honeyfarm
-
M. Vrable, J. Ma, J. Chen, D. Moore, E. Vandekieft, A.C. Snoeren, G.M. Voelker, and S. Savage, "Scalability, fidelity, and containment in the potemkin virtual honeyfarm," ACM SIGOPS Operating Systems Review, vol.39, no.5, pp.148-162, 2005.
-
(2005)
ACM SIGOPS Operating Systems Review
, vol.39
, Issue.5
, pp. 148-162
-
-
Vrable, M.1
Ma, J.2
Chen, J.3
Moore, D.4
Vandekieft, E.5
Snoeren, A.C.6
Voelker, G.M.7
Savage, S.8
-
10
-
-
34047110218
-
Toward automated dynamic malware analysis using CWSandbox
-
C. Willems, T. Holz, and F. Freiling, "Toward automated dynamic malware analysis using CWSandbox," IEEE Security & Privacy Magazine, vol.5, no.2, pp.32-39, 2007.
-
(2007)
IEEE Security & Privacy Magazine
, vol.5
, Issue.2
, pp. 32-39
-
-
Willems, C.1
Holz, T.2
Freiling, F.3
-
11
-
-
85027178894
-
-
CW Sandbox, http://www.cwsandbox.org/
-
CW Sandbox
-
-
-
12
-
-
85027176863
-
-
Anubis, http://analysis.seclab.tuwien.ac.at/
-
Anubis
-
-
-
13
-
-
85027200716
-
-
NORMAN Sandbox Information Center
-
NORMAN Sandbox Information Center, http://www.norman.com/microsites/nsic/
-
-
-
-
14
-
-
85027103269
-
-
Sourcefire Vulnerability Research Team (VRT)
-
Sourcefire Vulnerability Research Team (VRT) Certified Rules, http://www.snort.org/vrt/
-
Certified Rules
-
-
-
15
-
-
84893332856
-
-
virustotal, http://www.virustotal.com/
-
Virustotal
-
-
-
16
-
-
85027142096
-
-
Joebox, http://www.joebox.org/
-
Joebox
-
-
-
18
-
-
85027119715
-
-
InCTRL Reporting, Analysis Measuretronix Ltd.
-
InCTRL Reporting & Analysis, Measuretronix Ltd. http://www.
-
-
-
|