-
2
-
-
77950789445
-
-
Vx heavens. http://vx.netlux.org/.
-
Vx heavens
-
-
-
4
-
-
21644433634
-
Xen and the art of virtualization
-
P. Barham, B. Dragovic, K. Fraser, S. Hand, T. Harris, A. Ho, R. Neugebauer, I. Pratt, and A. Warfield. Xen and the art of virtualization. In ACM Symposium on Operating Systems Principles, 2003.
-
ACM Symposium on Operating Systems Principles, 2003
-
-
Barham, P.1
Dragovic, B.2
Fraser, K.3
Hand, S.4
Harris, T.5
Ho, A.6
Neugebauer, R.7
Pratt, I.8
Warfield, A.9
-
7
-
-
77950801676
-
Webroot: 40 percent of companies report disruptions due to malware
-
Mar
-
E. Chickowski. Webroot: 40 percent of companies report disruptions due to malware. SC Magazine, Mar 2007.
-
(2007)
SC Magazine
-
-
Chickowski, E.1
-
9
-
-
77950789080
-
Adware Firms Up the Ante on Anti-Spyware
-
Mar
-
W. Davis. Adware Firms Up The Ante On Anti-Spyware. Online Media Daily, Mar 2005.
-
(2005)
Online Media Daily
-
-
Davis, W.1
-
14
-
-
74049116761
-
Remote detection of virtual machine monitors with fuzzy benchmarking
-
Apr
-
J. Franklin, M. Luk, J. M. McCune, A. Seshadri, A. Perrig, and L. V. Doorn. Remote detection of virtual machine monitors with fuzzy benchmarking. ACM SIGOPS Operating System Review Special Edition on Computer Forensics, 42(3):83-92, Apr 2008.
-
(2008)
ACM SIGOPS Operating System Review Special Edition on Computer Forensics
, vol.42
, Issue.3
, pp. 83-92
-
-
Franklin, J.1
Luk, M.2
McCune, J.M.3
Seshadri, A.4
Perrig, A.5
Doorn, L.V.6
-
30
-
-
77950847230
-
Automated web patrol with strider honeymonkeys: Finding web sites that exploit browser vulnerabilities
-
Y. min Wang, Y. min Wang, D. Beck, D. Beck, X. Jiang, X. Jiang, R. Roussev, and R. Roussev. Automated web patrol with strider honeymonkeys: Finding web sites that exploit browser vulnerabilities. In NDSS, 2006.
-
(2006)
NDSS
-
-
Min Wang, Y.1
Min Wang, Y.2
Beck, D.3
Beck, D.4
Jiang, X.5
Jiang, X.6
Roussev, R.7
Roussev, R.8
-
40
-
-
70449824733
-
Secvisor: A tiny hypervisor to provide lifetime kernel code integrity for commodity oses
-
A. Seshadri, M. Luk, N. Qu, and A. Perrig. Secvisor: a tiny hypervisor to provide lifetime kernel code integrity for commodity oses. In SOSP '07, 2007.
-
(2007)
SOSP '07
-
-
Seshadri, A.1
Luk, M.2
Qu, N.3
Perrig, A.4
-
42
-
-
84890636971
-
Hacking Malware: Offense is the new Defense
-
14, Aug
-
V. Smith and D. Quist. Hacking Malware: Offense is the new Defense. Defcon, 14, Aug 2006.
-
(2006)
Defcon
-
-
Smith, V.1
Quist, D.2
-
43
-
-
77950814470
-
Covert Debugging: Circumventing Software Armoring
-
Aug
-
V. Smith and D. Quist. Covert Debugging: Circumventing Software Armoring. Blackhat Las Vegas, Aug 2007.
-
(2007)
Blackhat Las Vegas
-
-
Smith, V.1
Quist, D.2
-
44
-
-
58449129985
-
BitBlaze: A new approach to computer security via binary analysis
-
D. Song, D. Brumley, H. Yin, J. Caballero, I. Jager, M. G. Kang, Z. Liang, J. Newsome, P. Poosankam, and P. Saxena. BitBlaze: A new approach to computer security via binary analysis. In International Conference on Information Systems Security, Dec 2008.
-
International Conference on Information Systems Security, Dec 2008
-
-
Song, D.1
Brumley, D.2
Yin, H.3
Caballero, J.4
Jager, I.5
Kang, M.G.6
Liang, Z.7
Newsome, J.8
Poosankam, P.9
Saxena, P.10
-
46
-
-
33750376717
-
Scalability, fidelity, and containment in the potemkin virtual honeyfarm
-
M. Vrable, J. Ma, J. Chen, D. Moore, E. Vandekieft, A. C. Snoeren, G. M. Voelker, and S. Savage. Scalability, fidelity, and containment in the potemkin virtual honeyfarm. SIGOPS Oper. Syst. Rev., 39(5):148-162, 2005.
-
(2005)
SIGOPS Oper. Syst. Rev.
, vol.39
, Issue.5
, pp. 148-162
-
-
Vrable, M.1
Ma, J.2
Chen, J.3
Moore, D.4
Vandekieft, E.5
Snoeren, A.C.6
Voelker, G.M.7
Savage, S.8
-
48
-
-
77950851791
-
-
O. Yuschuk. Ollydbg. http://www.ollydbg.de/.
-
-
-
Yuschuk, O.1
-
51
-
-
77950827827
-
Using VMware for Malware Analysis
-
May
-
L. Zeltser. Using VMware for Malware Analysis. SearchSecurity.com, May 2007.
-
(2007)
SearchSecurity.com
-
-
Zeltser, L.1
|