-
1
-
-
77952331997
-
-
AutoHotkey
-
AutoHotkey. http://www.autohotkey.com/.
-
-
-
-
4
-
-
77952347521
-
-
Blacklight
-
Blacklight. http://www.europe.f-secure.com/exclude/blacklight/.
-
-
-
-
6
-
-
58449115871
-
BitScope: Automatically dissecting malicious binaries
-
School of Computer Science, Carnegie Mellon University, March
-
D. Brumley, C. Hartwig, M. G. Kang, Z. Liang, J. Newsome, D. Song, and H. Yin. BitScope: Automatically dissecting malicious binaries. Technical Report CMU-CS-07-133, School of Computer Science, Carnegie Mellon University, March 2007.
-
(2007)
Technical Report CMU-CS-07-133
-
-
Brumley, D.1
Hartwig, C.2
Kang, M.G.3
Liang, Z.4
Newsome, J.5
Song, D.6
Yin, H.7
-
7
-
-
77952346542
-
-
D. Brumley, C. Hartwig, Z. Liang, J. Newsome, D. Song, and H. Yin. Botnet Analysis, chapter Automatically Identifying Trigger-based Behavior in Malware. 2007.
-
(2007)
Botnet Analysis, Chapter Automatically Identifying Trigger-based Behavior in Malware
-
-
Brumley, D.1
Hartwig, C.2
Liang, Z.3
Newsome, J.4
Song, D.5
Yin, H.6
-
8
-
-
33751059942
-
VICE-catch the hookers!
-
July
-
J. Butler and G. Hoglund. VICE-catch the hookers! In Black Hat USA, July 2004. http://www.blackhat.com/presentations/bh-usa-04/bh-us-04-butler/bh-us-04- butlerpdf.
-
(2004)
Black Hat USA
-
-
Butler, J.1
Hoglund, G.2
-
9
-
-
77952405499
-
Shadow walker: Raising the bar for windows rootkit detection
-
July
-
J. Butler and S. Sparks. Shadow walker: Raising the bar for windows rootkit detection. In Phrack 63, July 2005.
-
(2005)
Phrack
, vol.63
-
-
Butler, J.1
Sparks, S.2
-
10
-
-
85084160792
-
Understanding data lifetime via whole system simulation
-
August
-
J. Chow, B. Pfaff, T. Garfinkel, K. Christopher, and M. Rosenblum. Understanding data lifetime via whole system simulation. In Proceedings of the 13th USENIX Security Symposium (Security'03), August 2004.
-
(2004)
Proceedings of the 13th USENIX Security Symposium (Security'03)
-
-
Chow, J.1
Pfaff, B.2
Garfinkel, T.3
Christopher, K.4
Rosenblum, M.5
-
11
-
-
27544433210
-
Semantics-aware malware detection
-
May
-
M. Christodorescu, S. Jha, S. A. Seshia, D. Song, and R. E. Bryant. Semantics-aware malware detection. In Proceedings of the 2005 IEEE Symposium on Security and Privacy (Oakland'05), May 2005.
-
(2005)
Proceedings of the 2005 IEEE Symposium on Security and Privacy (Oakland'05)
-
-
Christodorescu, M.1
Jha, S.2
Seshia, S.A.3
Song, D.4
Bryant, R.E.5
-
12
-
-
84885679117
-
Vigilante: End-to-end containment of internet worms
-
October
-
M. Costa, J. Crowcroft, M. Castro, A. Rowstron, L. Zhou, L. Zhang, and P. Barham. Vigilante: End-to-end containment of internet worms. In Proceedings of the 20th ACM Symposium on Operating Systems Principles (SOSP'05), October 2005.
-
(2005)
Proceedings of the 20th ACM Symposium on Operating Systems Principles (SOSP'05)
-
-
Costa, M.1
Crowcroft, J.2
Castro, M.3
Rowstron, A.4
Zhou, L.5
Zhang, L.6
Barham, P.7
-
14
-
-
84903607772
-
Dynamic spyware analysis
-
June
-
M. Egele, C. Kruegel, E. Kirda, H. Yin, and D. Song. Dynamic Spyware Analysis. In Proceed i ngs of the 2007 Usenix Annual Conference (Usenix'07), June 2007.
-
(2007)
Proceed I Ngs of the 2007 Usenix Annual Conference (Usenix'07)
-
-
Egele, M.1
Kruegel, C.2
Kirda, E.3
Yin, H.4
Song, D.5
-
15
-
-
38349023177
-
Attacks on virtual machine emulators
-
December
-
P. Ferrie. Attacks on virtual machine emulators. Symantec Security Response, December 2006.
-
(2006)
Symantec Security Response
-
-
Ferrie, P.1
-
16
-
-
77952386169
-
-
GINA spy
-
GINA spy. http://www.codeproject.com/useritems/GINA-SPY. Asp.
-
-
-
-
17
-
-
84885588230
-
The taser intrusion recovery system
-
October
-
A. Goel, K. Po, K. Farhadi, Z. Li, and E. de Lara. The taser intrusion recovery system. In Proceedings of the 20th ACM Symposium on Operating Systems Principles (SOSP'05), October 2005.
-
(2005)
Proceedings of the 20th ACM Symposium on Operating Systems Principles (SOSP'05)
-
-
Goel, A.1
Po, K.2
Farhadi, K.3
Li, Z.4
De Lara, E.5
-
18
-
-
77952395569
-
-
Google's desktop search red flag
-
Google's desktop search red flag. http://www.internetnews.com/xSP/ article.php/3584131.
-
-
-
-
19
-
-
77952353199
-
-
Google Desktop - Privacy Policy
-
Google Desktop - Privacy Policy. http://desktop. google.com/en/ privacypolicy.html.
-
-
-
-
20
-
-
34748845128
-
Practical taint-based protection using demand emulation
-
April
-
A. Ho, M. Fetterman, C. Clark, A. Watfield, and S. Hand. Practical taint-based protection using demand emulation. In EuroSys 2006, April 2006.
-
(2006)
EuroSys 2006
-
-
Ho, A.1
Fetterman, M.2
Clark, C.3
Watfield, A.4
Hand, S.5
-
21
-
-
39049086327
-
Back to the future: A framework for automatic malware removal and system repair
-
December
-
F. Hsu, H. Chen, T. Ristenpart, J. Li, and Z. Su. Back to the future: A framework for automatic malware removal and system repair. In Proceedings of the 22nd Annual Computer Security Applications Conference (ACSAC'06), December 2006.
-
(2006)
Proceedings of the 22nd Annual Computer Security Applications Conference (ACSAC'06)
-
-
Hsu, F.1
Chen, H.2
Ristenpart, T.3
Li, J.4
Su, Z.5
-
22
-
-
77952376950
-
-
IDA Pro Disassembler and Debugger
-
The IDA Pro Disassembler and Debugger. http://www.datarescue.com/idabase/ .
-
-
-
-
28
-
-
33750325871
-
Argos: An emulator for fingerprinting zero-day attacks
-
April
-
G. Portokalidis, A. Slowinska, and H. Bos. Argos: an emulator for fingerprinting zero-day attacks. In EuroSys 2006, April 2006.
-
(2006)
EuroSys 2006
-
-
Portokalidis, G.1
Slowinska, A.2
Bos, H.3
-
29
-
-
77952403160
-
-
Qemu
-
Qemu. http://fabrice.bellard.free.fr/qemu/.
-
-
-
-
31
-
-
40349087553
-
LIFT: A low-overhead practical information flow tracking system for detecting general security attacks
-
December
-
F. Qin, C. Wang, Z. Li, H. seop Kim, Y. Zhou, and Y. Wu. LIFT: A low-overhead practical information flow tracking system for detecting general security attacks. In Proceedings of the 39th Annual IEEE/ACM International Symposium on Microarchitecture (MICRO'06), December 2006.
-
(2006)
Proceedings of the 39th Annual IEEE/ACM International Symposium on Microarchitecture (MICRO'06)
-
-
Qin, F.1
Wang, C.2
Li, Z.3
Kim, H.S.4
Zhou, Y.5
Wu, Y.6
-
32
-
-
77952343603
-
-
Rootkit revealer
-
Rootkit revealer. http://www.sysinternals.com/Files/RootkitRevealer.zip.
-
-
-
-
33
-
-
38149023819
-
System virginity verifier: Defining the roadmap for malware detection on windows systems
-
September
-
J. Rutkowska. System virginity verifier: Defining the roadmap for malware detection on windows systems. In Hack In The Box Security Conference, September 2005. http://www.invisiblethings.org/papers/hitb05-virginity-verifier.ppt.
-
(2005)
Hack in the Box Security Conference
-
-
Rutkowska, J.1
-
38
-
-
49949088887
-
Cross-site scripting prevention with dynamic data tainting and static analysis
-
February
-
P. Vogt, F. Nentwich, N. Jovanovic, E. Kirda, C. Kruegel, and G. Vigna. Cross-Site Scripting Prevention with Dynamic Data Tainting and Static Analysis. In Proceeding of the Network and Distributed System Security Symposium (NDSS'07), February 2007.
-
(2007)
Proceeding of the Network and Distributed System Security Symposium (NDSS'07)
-
-
Vogt, P.1
Nentwich, F.2
Jovanovic, N.3
Kirda, E.4
Kruegel, C.5
Vigna, G.6
-
39
-
-
79960164190
-
Gatekeeper: Monitoring auto-start extensibility points (ASEPs) for spyware management
-
November
-
Y.-M. Wang, R. Roussev, C. Verbowski, A. Johnson, M.-W. Wu, Y. Huang, and S.-Y. Kuo. Gatekeeper: Monitoring Auto-Start Extensibility Points (ASEPs) for spyware management. In Proceedings of the Large Installation System Administration Conference (LISA'04), November 2004.
-
(2004)
Proceedings of the Large Installation System Administration Conference (LISA'04)
-
-
Wang, Y.-M.1
Roussev, R.2
Verbowski, C.3
Johnson, A.4
Wu, M.-W.5
Huang, Y.6
Kuo, S.-Y.7
|