-
1
-
-
76649141154
-
-
Springer
-
K. Griffin, S. Schneider, X. Hu and T. Chiueh, "Automatic generation of string signatures for malware detection," Springer, 2009, pp. 101.
-
(2009)
Automatic Generation of String Signatures for Malware Detection
, pp. 101
-
-
Griffin, K.1
Schneider, S.2
Hu, X.3
Chiueh, T.4
-
3
-
-
0016518897
-
Efficient string matching: An aid to bibliographic search
-
A.V. Aho and M.J. Corasick, "Efficient string matching: An aid to bibliographic search," Communications of the ACM, vol. 18, no. 6, 1975, pp. 340.
-
(1975)
Communications of the ACM
, vol.18
, Issue.6
, pp. 340
-
-
Aho, A.V.1
Corasick, M.J.2
-
4
-
-
54849432819
-
Digital genome mapping-advanced binary malware analysis
-
E. Carrera and G. Erdélyi, "Digital genome mapping-advanced binary malware analysis," Virus Bulletin Conference, 2004, pp. 187-197.
-
(2004)
Virus Bulletin Conference
, pp. 187-197
-
-
Carrera, E.1
Erdélyi, G.2
-
5
-
-
33745670395
-
Polymorphic worm detection using structural information of executables
-
C. Kruegel, E. Kirda, D. Mutz, W. Robertson and G. Vigna, "Polymorphic worm detection using structural information of executables," Lecture notes in computer science, vol. 3858, 2006, pp. 207.
-
(2006)
Lecture Notes in Computer Science
, vol.3858
, pp. 207
-
-
Kruegel, C.1
Kirda, E.2
Mutz, D.3
Robertson, W.4
Vigna, G.5
-
6
-
-
34748820878
-
Polyunpack: Automating the hidden-code extraction of unpack-executing malware
-
P. Royal, M. Halpin, D. Dagon, R. Edmonds and W. Lee, "Polyunpack: Automating the hidden-code extraction of unpack-executing malware," Computer Security Applications Conference, 2006, pp. 289-300.
-
(2006)
Computer Security Applications Conference
, pp. 289-300
-
-
Royal, P.1
Halpin, M.2
Dagon, D.3
Edmonds, R.4
Lee, W.5
-
8
-
-
48649089436
-
Improving proactive detection of packed malware
-
A. Stepan, "Improving proactive detection of packed malware," Virus Bulletin Conference, 2006.
-
(2006)
Virus Bulletin Conference
-
-
Stepan, A.1
-
10
-
-
36849096063
-
Imds: Intelligent malware detection system
-
Y. Ye, D. Wang, T. Li and D. Ye, "Imds: Intelligent malware detection system," ACM, 2007, pp. 1047.
-
(2007)
ACM
, pp. 1047
-
-
Ye, Y.1
Wang, D.2
Li, T.3
Ye, D.4
-
11
-
-
33746882464
-
Malware phylogeny generation using permutations of code
-
M.E. Karim, A. Walenstein, A. Lakhotia and L. Parida, "Malware phylogeny generation using permutations of code," Journal in Computer Virology, vol. 1, no. 1, 2005, pp. 13-23.
-
(2005)
Journal in Computer Virology
, vol.1
, Issue.1
, pp. 13-23
-
-
Karim, M.E.1
Walenstein, A.2
Lakhotia, A.3
Parida, L.4
-
12
-
-
60649088451
-
Mcboost: Boosting scalability in malware collection and analysis using statistical classification of executables
-
IEEE Computer Society Washington, DC, USA
-
R. Perdisci, A. Lanzi and W. Lee, "Mcboost: Boosting scalability in malware collection and analysis using statistical classification of executables," Proceedings of the 2008 Annual Computer Security Applications Conference, IEEE Computer Society Washington, DC, USA, 2008, pp. 301-310.
-
(2008)
Proceedings of the 2008 Annual Computer Security Applications Conference
, pp. 301-310
-
-
Perdisci, R.1
Lanzi, A.2
Lee, W.3
-
14
-
-
54849414050
-
An automated virus classification system
-
M. Gheorghescu, "An automated virus classification system," Virus Bulletin Conference, 2005, pp. 294-300.
-
(2005)
Virus Bulletin Conference
, pp. 294-300
-
-
Gheorghescu, M.1
-
15
-
-
77954316719
-
Graph-based comparison of executable objects (English version)
-
T. Dullien and R. Rolles, "Graph-based comparison of executable objects (english version)," SSTIC, 2005.
-
(2005)
SSTIC
-
-
Dullien, T.1
Rolles, R.2
-
16
-
-
77954325210
-
Graphs, entropy and grid computing: Automatic comparison of malware
-
I. Briones and A. Gomez, "Graphs, entropy and grid computing: Automatic comparison of malware," Virus Bulletin Conference, 2008, pp. 1-12.
-
(2008)
Virus Bulletin Conference
, pp. 1-12
-
-
Briones, I.1
Gomez, A.2
-
17
-
-
77954328326
-
-
Zynamics, "Vxclass," http://www.zynamics.com/vxclass.html.
-
Vxclass
-
-
-
18
-
-
57049171932
-
Binhunt: Automatically finding semantic differences in binary programs
-
Springer
-
D. Gao, M.K. Reiter and D. Song, "Binhunt: Automatically finding semantic differences in binary programs," Information and Communications Security, Springer, 2008, pp. 238-255.
-
(2008)
Information and Communications Security
, pp. 238-255
-
-
Gao, D.1
Reiter, M.K.2
Song, D.3
-
21
-
-
58149090298
-
Morphological detection of malware
-
IEEE
-
G. Bonfante, M. Kaczmarek and J.Y. Marion, "Morphological detection of malware," International Conference on Malicious and Unwanted Software, IEEE, 2008, pp. 1-8.
-
(2008)
International Conference on Malicious and Unwanted Software
, pp. 1-8
-
-
Bonfante, G.1
Kaczmarek, M.2
Marion, J.Y.3
-
22
-
-
34047129159
-
Using entropy analysis to find encrypted and packed malware
-
R. Lyda and J. Hamrock, "Using entropy analysis to find encrypted and packed malware," IEEE Security and Privacy, vol. 5, no. 2, 2007, pp. 40.
-
(2007)
IEEE Security and Privacy
, vol.5
, Issue.2
, pp. 40
-
-
Lyda, R.1
Hamrock, J.2
-
23
-
-
85084160818
-
Static disassembly of obfuscated binaries
-
C. Kruegel, W. Robertson, F. Valeur and G. Vigna, "Static disassembly of obfuscated binaries," USENIX Security Symposium, 2004, pp. 18-18.
-
(2004)
USENIX Security Symposium
, pp. 18
-
-
Kruegel, C.1
Robertson, W.2
Valeur, F.3
Vigna, G.4
-
25
-
-
0027188633
-
Data structures and algorithms for nearest neighbor search in general metric spaces
-
Society for Industrial and Applied Mathematics
-
N.Y. Peter, "Data structures and algorithms for nearest neighbor search in general metric spaces," Proceedings of the fourth annual ACM-SIAM Symposium on Discrete algorithms, Society for Industrial and Applied Mathematics, 1993, pp. 311-321.
-
(1993)
Proceedings of the Fourth Annual ACM-SIAM Symposium on Discrete Algorithms
, pp. 311-321
-
-
Peter, N.Y.1
-
26
-
-
77954335796
-
-
"Offensive computing," 2009; http://www.offensivecomputing.net.
-
(2009)
Offensive Computing
-
-
-
27
-
-
77954324163
-
-
"Mwcollect alliance," 2009; http://alliance.mwcollect.org.
-
(2009)
Mwcollect Alliance
-
-
-
28
-
-
0019049469
-
An approach to the problem of detranslation of computer programs
-
R.N. Horspool and N. Marovac, "An approach to the problem of detranslation of computer programs," The Computer Journal, vol. 23, no. 3, 1979, pp. 223-229.
-
(1979)
The Computer Journal
, vol.23
, Issue.3
, pp. 223-229
-
-
Horspool, R.N.1
Marovac, N.2
-
29
-
-
48649084773
-
Omniunpack: Fast, generic, and safe unpacking of malware
-
L. Martignoni, M. Christodorescu and S. Jha, "Omniunpack: Fast, generic, and safe unpacking of malware," Proceedings of the Annual Computer Security Applications Conference (ACSAC), 2007, pp. 431-441.
-
(2007)
Proceedings of the Annual Computer Security Applications Conference (ACSAC)
, pp. 431-441
-
-
Martignoni, L.1
Christodorescu, M.2
Jha, S.3
|