-
2
-
-
77954740803
-
-
Vx heavens. http://vx.netlux.org.
-
Vx Heavens
-
-
-
3
-
-
35348932512
-
Antiheuristics
-
AVV
-
AVV. Antiheuristics. 29A Magazine, 1(1), 1999.
-
(1999)
29A Magazine
, vol.1
, Issue.1
-
-
-
4
-
-
34047180006
-
Code normalization for self-mutating malware
-
D. Bruschi, L. Martignoni, and M. Monga. Code normalization for self-mutating malware. IEEE Security & Privacy, 5(2):46-54, 2007.
-
(2007)
IEEE Security & Privacy
, vol.5
, Issue.2
, pp. 46-54
-
-
Bruschi, D.1
Martignoni, L.2
Monga, M.3
-
5
-
-
27144489164
-
A tutorial on support vector machines for pattern recognition
-
C. J. C. Burges. A tutorial on support vector machines for pattern recognition. Data Min. Knowl. Discov., 2(2):121-167, 1998. (Pubitemid 128695475)
-
(1998)
Data Mining and Knowledge Discovery
, vol.2
, Issue.2
, pp. 121-167
-
-
Burges, C.J.C.1
-
6
-
-
23744485744
-
Testing malware detectors
-
M. Christodorescu and S. Jha. Testing malware detectors. In ISSTA, pages 34-44, 2004.
-
(2004)
ISSTA
, pp. 34-44
-
-
Christodorescu, M.1
Jha, S.2
-
7
-
-
27544433210
-
Semantics-aware malware detection
-
M. Christodorescu, S. Jha, S. A. Seshia, D. X. Song, and R. E. Bryant. Semantics-aware malware detection. In IEEE Symposium on Security and Privacy, pages 32-46, 2005.
-
(2005)
IEEE Symposium on Security and Privacy
, pp. 32-46
-
-
Christodorescu, M.1
Jha, S.2
Seshia, S.A.3
Song, D.X.4
Bryant, R.E.5
-
8
-
-
34547464948
-
-
Technical report, University of Wisconsin, November
-
M. Christodorescu, J. Kinder, S. Jha, S. Katzenbeisser, and H. Veith. Malware normalization. Technical report, University of Wisconsin, November 2005.
-
(2005)
Malware Normalization
-
-
Christodorescu, M.1
Kinder, J.2
Jha, S.3
Katzenbeisser, S.4
Veith, H.5
-
9
-
-
0023294949
-
Computer viruses: Theory and experiments
-
September
-
F. Cohen. Computer viruses: Theory and experiments. In 7th DOD/NBS Computers and Security Conference, volume 6, pages 22-35, September 1987.
-
(1987)
7th DOD/NBS Computers and Security Conference
, vol.6
, pp. 22-35
-
-
Cohen, F.1
-
11
-
-
77954712504
-
Metamorphism in practice
-
M. Driller. Metamorphism in practice. 29A Magazine, 1(6), 2002.
-
(2002)
29A Magazine
, vol.1
, Issue.6
-
-
Driller, M.1
-
12
-
-
48349134267
-
Behavioral detection of malware: From a survey towards an established taxonomy
-
G. Jacob, H. Debar, and E. Filiol. Behavioral detection of malware: from a survey towards an established taxonomy. Journal in Computer Virology, 4(3):251-266, 2008.
-
(2008)
Journal in Computer Virology
, vol.4
, Issue.3
, pp. 251-266
-
-
Jacob, G.1
Debar, H.2
Filiol, E.3
-
14
-
-
35349024064
-
Metamorphism
-
L. Julus. Metamorphism. 29A Magazine, 1(5), 2000.
-
(2000)
29A Magazine
, vol.1
, Issue.5
-
-
Julus, L.1
-
15
-
-
12244279567
-
Learning to detect malicious executables in the wild
-
J. Z. Kolter and M. A. Maloof. Learning to detect malicious executables in the wild. In KDD, pages 470-478, 2004.
-
(2004)
KDD
, pp. 470-478
-
-
Kolter, J.Z.1
Maloof, M.A.2
-
16
-
-
34047129159
-
Using entropy analysis to find encrypted and packed malware
-
R. Lyda and J. Hamrock. Using entropy analysis to find encrypted and packed malware. IEEE Security & Privacy, 5(2):40-45, 2007.
-
(2007)
IEEE Security & Privacy
, vol.5
, Issue.2
, pp. 40-45
-
-
Lyda, R.1
Hamrock, J.2
-
18
-
-
48649087530
-
Limits of static analysis for malware detection
-
A. Moser, C. Kruegel, and E. Kirda. Limits of static analysis for malware detection. In ACSAC, pages 421-430, 2007.
-
(2007)
ACSAC
, pp. 421-430
-
-
Moser, A.1
Kruegel, C.2
Kirda, E.3
-
20
-
-
0030736223
-
Computer virus-antivirus coevolution
-
C. Nachenberg. Computer virus-antivirus coevolution. Commun. ACM, 40(1):46-51, 1997.
-
(1997)
Commun. ACM
, vol.40
, Issue.1
, pp. 46-51
-
-
Nachenberg, C.1
-
21
-
-
51849164885
-
A semantics-based approach to malware detection
-
M. D. Preda, M. Christodorescu, S. Jha, and S. K. Debray. A semantics-based approach to malware detection. ACM Trans. Program. Lang. Syst., 30(5), 2008.
-
(2008)
ACM Trans. Program. Lang. Syst.
, vol.30
, Issue.5
-
-
Preda, M.D.1
Christodorescu, M.2
Jha, S.3
Debray, S.K.4
-
22
-
-
77954692973
-
Polimorphism
-
Rajaat. Polimorphism. 29A Magazine, 1(3), 1999.
-
(1999)
29A Magazine
, vol.1
, Issue.3
-
-
Rajaat1
-
23
-
-
0036448558
-
0002: Calculation of graph similarity using maximum common edge subgraphs
-
J. W. Raymond, E. J. Gardiner, and P. W. 0002. Rascal: Calculation of graph similarity using maximum common edge subgraphs. Comput. J., 45(6):631-644, 2002.
-
(2002)
Comput. J.
, vol.45
, Issue.6
, pp. 631-644
-
-
Raymond, J.W.1
Gardiner, E.J.2
Rascal, P.W.3
-
24
-
-
70349869466
-
Signature generation and detection of malware families
-
V. S. Sathyanarayan, P. Kohli, and B. Bruhadeshwar. Signature generation and detection of malware families. In ACISP, pages 336-349, 2008.
-
(2008)
ACISP
, pp. 336-349
-
-
Sathyanarayan, V.S.1
Kohli, P.2
Bruhadeshwar, B.3
-
25
-
-
0034838197
-
Data mining methods for detection of new malicious executables
-
M. G. Schultz, E. Eskin, E. Zadok, and S. J. Stolfo. Data mining methods for detection of new malicious executables. In IEEE Symposium on Security and Privacy, pages 38-49, 2001.
-
(2001)
IEEE Symposium on Security and Privacy
, pp. 38-49
-
-
Schultz, M.G.1
Eskin, E.2
Zadok, E.3
Stolfo, S.J.4
-
28
-
-
34547197548
-
Normalizing metamorphic malware using term rewriting
-
A. Walenstein, R. Mathur, M. R. Chouchane, and A. Lakhotia. Normalizing metamorphic malware using term rewriting. In SCAM, pages 75-84, 2006.
-
(2006)
SCAM
, pp. 75-84
-
-
Walenstein, A.1
Mathur, R.2
Chouchane, M.R.3
Lakhotia, A.4
-
29
-
-
2342663706
-
Virus detection using data mining techinques
-
J.-H. Wang, P. Deng, Y.-S. Fan, L.-J. Jaw, and Y.-C. Liu. Virus detection using data mining techinques. In Proceedings. IEEE 37th Annual 2003 International Carnahan Conference on, pages 71-76, 2003.
-
(2003)
Proceedings. IEEE 37th Annual 2003 International Carnahan Conference on
, pp. 71-76
-
-
Wang, J.-H.1
Deng, P.2
Fan, Y.-S.3
Jaw, L.-J.4
Liu, Y.-C.5
-
30
-
-
34047110218
-
Toward automated dynamic malware analysis using cwsandbox
-
C. Willems, T. Holz, and F. C. Freiling. Toward automated dynamic malware analysis using cwsandbox. IEEE Security & Privacy, 5(2):32-39, 2007.
-
(2007)
IEEE Security & Privacy
, vol.5
, Issue.2
, pp. 32-39
-
-
Willems, C.1
Holz, T.2
Freiling, F.C.3
-
31
-
-
0040994741
-
On a certain distance between isomorphism classes of graph
-
B. Zelinka. On a certain distance between isomorphism classes of graph. In Casopis pro pestovani Matematiky, volume 100, pages 371-373, 1975.
-
(1975)
Casopis Pro Pestovani Matematiky
, vol.100
, pp. 371-373
-
-
Zelinka, B.1
|