-
1
-
-
77954701677
-
-
ANUBIS. http://anubis.iseclab.org, 2009.
-
(2009)
-
-
-
2
-
-
77954748864
-
-
Article about Pinch in the Washington Post. http://blog.washingtonpost. com/securityfix/ 2007/11/new-malware-defeats-sitekey-te.html? nav=rss-blog, 2009.
-
(2009)
Article about Pinch in the Washington Post
-
-
-
3
-
-
77954735249
-
-
Boost.Python C++ library. http://www.boost.org, 2009.
-
(2009)
Python C++ Library
-
-
-
4
-
-
77954735592
-
-
CWSandbox. http://www.cwsandbox.org/, 2009.
-
(2009)
-
-
-
8
-
-
77954715922
-
-
JoeBox. http://www.joebox.org, 2009.
-
(2009)
-
-
-
9
-
-
77954721324
-
-
Norman Sandbox. http://www.norman.com/microsites/nsic/, 2009.
-
(2009)
-
-
-
10
-
-
77954702193
-
-
ThreatExpert. http://www.threatexpert.com/, 2009.
-
(2009)
-
-
-
11
-
-
58149084148
-
Automated classification and analysis of internet malware
-
M. Bailey, J. Oberheide, J. Andersen, Z. M. Mao, F. Jahanian, and J. Nazario. Automated classification and analysis of internet malware. In Proceedings of the 10th International Symposium on Recent Advances in Intrusion Detection (RAID'07), September 2007.
-
Proceedings of the 10th International Symposium on Recent Advances in Intrusion Detection (RAID'07), September 2007
-
-
Bailey, M.1
Oberheide, J.2
Andersen, J.3
Mao, Z.M.4
Jahanian, F.5
Nazario, J.6
-
13
-
-
77955038057
-
Scalable, Behavior-Based Malware Clustering
-
U. Bayer, P. Milani Comparetti, C. Hlauschek, C. Kruegel, and E. Kirda. Scalable, Behavior-Based Malware Clustering. In Symposium on Network and Distributed System Security (NDSS), 2009.
-
Symposium on Network and Distributed System Security (NDSS), 2009
-
-
Bayer, U.1
Milani Comparetti, P.2
Hlauschek, C.3
Kruegel, C.4
Kirda, E.5
-
14
-
-
0010362121
-
Syntactic clustering of the web
-
A. Z. Broder, S. C. Glassman, M. S. Manasse, and G. Zweig. Syntactic clustering of the web. Comput. Netw. ISDN Syst., 29(8-13):1157-1166, 1997.
-
(1997)
Comput. Netw. ISDN Syst.
, vol.29
, Issue.8-13
, pp. 1157-1166
-
-
Broder, A.Z.1
Glassman, S.C.2
Manasse, M.S.3
Zweig, G.4
-
16
-
-
27544433210
-
Semantics-Aware Malware Detection
-
M. Christodorescu, S. Jha, S. Seshia, D. Song, and R. Bryant. Semantics-Aware Malware Detection. In IEEE Symposium on Security and Privacy, 2005.
-
IEEE Symposium on Security and Privacy, 2005
-
-
Christodorescu, M.1
Jha, S.2
Seshia, S.3
Song, D.4
Bryant, R.5
-
18
-
-
56549090955
-
A study of the packer problem and its solutions
-
Berlin, Heidelberg, Springer-Verlag
-
F. Guo, P. Ferrie, and T.-C. Chiueh. A study of the packer problem and its solutions. In RAID '08: Proceedings of the 11th international symposium on Recent Advances in Intrusion Detection, pages 98-115, Berlin, Heidelberg, 2008. Springer-Verlag.
-
(2008)
RAID '08: Proceedings of the 11th International Symposium on Recent Advances in Intrusion Detection
, pp. 98-115
-
-
Guo, F.1
Ferrie, P.2
Chiueh, T.-C.3
-
20
-
-
0031644241
-
Approximate nearest neighbors: Towards removing the curse of dimensionality
-
P. Indyk and R. Motwani. Approximate nearest neighbors: towards removing the curse of dimensionality. In Proc. of 30th STOC, pages 604-613, 1998.
-
(1998)
Proc. of 30th STOC
, pp. 604-613
-
-
Indyk, P.1
Motwani, R.2
-
21
-
-
84980090975
-
The Distribution of Flora in the Alpine Zone
-
P. Jaccard. The Distribution of Flora in the Alpine Zone. The New Phytologist, 11(2):37-50, 1912.
-
(1912)
The New Phytologist
, vol.11
, Issue.2
, pp. 37-50
-
-
Jaccard, P.1
-
24
-
-
14344262813
-
Obfuscation of executable code to improve resistance to static disassembly
-
New York, NY, USA ACM
-
C. Linn and S. Debray. Obfuscation of executable code to improve resistance to static disassembly. In CCS '03: Proceedings of the 10th ACM conference on Computer and communications security, pages 290-299, New York, NY, USA, 2003. ACM.
-
(2003)
CCS '03: Proceedings of the 10th ACM Conference on Computer and Communications Security
, pp. 290-299
-
-
Linn, C.1
Debray, S.2
-
25
-
-
48649087530
-
Limits of Static Analysis for Malware Detection
-
IEEE Computer Society
-
A. Moser, C. Kruegel, and E. Kirda. Limits of Static Analysis for Malware Detection. In ACSAC, pages 421-430. IEEE Computer Society, 2007.
-
(2007)
ACSAC
, pp. 421-430
-
-
Moser, A.1
Kruegel, C.2
Kirda, E.3
|