-
1
-
-
35348856143
-
Detecting Self-Mutating Malware Using Control Flow Graph Matching
-
Proceedings of the Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA), IEEE Computer Society
-
Bruschi, D., L. Martignoni, et al. (2006). Detecting Self-Mutating Malware Using Control Flow Graph Matching. Proceedings of the Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA), IEEE Computer Society.
-
(2006)
-
-
Bruschi, D.1
Martignoni, L.2
-
2
-
-
34047166855
-
Using Code Normalization for Fighting Self-Mutating Malware
-
Proceedings od the International Symposium of Secure Software Engineering, IEEE Computer Society
-
Bruschi, D., L. Martignoni, et al. (2006). Using Code Normalization for Fighting Self-Mutating Malware. Proceedings od the International Symposium of Secure Software Engineering, IEEE Computer Society.
-
(2006)
-
-
Bruschi, D.1
Martignoni, L.2
-
3
-
-
84896452284
-
Metamorphism in practice or "How I made MetaPHOR and what I've learnt"
-
VX Heavens
-
Driller, M. (2002) Metamorphism in practice or "How I made MetaPHOR and what I've learnt". VX Heavens. http://vx.netlux.org/lib/vmd01.html.
-
(2002)
-
-
Driller, M.1
-
4
-
-
84896305038
-
Metamorphism: A Software Protection Mechanism
-
International Conference on Inforfmation Warfare (ICIW2006), University of Maryland Eastern Shore, USA
-
Dube, T. E., K. S. Edge, et al. (2006). Metamorphism: A Software Protection Mechanism. International Conference on Inforfmation Warfare (ICIW2006), University of Maryland Eastern Shore, USA.
-
(2006)
-
-
Dube, T.E.1
Edge, K.S.2
-
5
-
-
84896284654
-
A Taxonomy of Protection Used in Computer Viruses and Their Application to Software Protection
-
International Conference on Inforfmation Warfare (ICIW2006), University of Maryland Eastern Shore, USA
-
Edge, K.S., Dube, T.E., et al. (2006). A Taxonomy of Protection Used in Computer Viruses and Their Application to Software Protection, International Conference on Inforfmation Warfare (ICIW2006), University of Maryland Eastern Shore, USA.
-
(2006)
-
-
Edge, K.S.1
Dube, T.E.2
-
7
-
-
33746877417
-
Dealing with metamorphism
-
Jordon, M. (2002). Dealing with metamorphism. Virus Bulletin: 4-6.
-
(2002)
Virus Bulletin
, pp. 4-6
-
-
Jordon, M.1
-
8
-
-
33746389292
-
Polymorphic Worm Detection Using Structural Information of Executables
-
Proceedings of the International Symposium on Recent Advances in Intrusion Detection (RAID), Springer-Verlag
-
Kruegel, C., E. Kirda, et al. (2005). Polymorphic Worm Detection Using Structural Information of Executables. Proceedings of the International Symposium on Recent Advances in Intrusion Detection (RAID), Springer-Verlag.
-
(2005)
-
-
Kruegel, C.1
Kirda, E.2
-
10
-
-
34047145867
-
Are Metamorphic Viruses Really Invincible? - Part I
-
Lakhotia, A., A. Kapoor, et al. (2004). Are Metamorphic Viruses Really Invincible? - Part I. Virus Bulletin: 5-7.
-
(2004)
Virus Bulletin
, pp. 5-7
-
-
Lakhotia, A.1
Kapoor, A.2
-
11
-
-
52249108679
-
Are Metamorphic Viruses Really Invincible? - Part II
-
Lakhotia, A., A. Kapoor, et al. (2005). Are Metamorphic Viruses Really Invincible? - Part II. Virus Bulletin: 9-12.
-
(2005)
Virus Bulletin
, pp. 9-12
-
-
Lakhotia, A.1
Kapoor, A.2
-
12
-
-
84896466930
-
Imposing Order on Program Statements and its implication to AV Scanner
-
Proceedings of 11th IEEE Working Conference on Reverse Engineering, Delft, The Netherlands, IEEE Computer Society Press, Los Alamitos, CA
-
Lakhotia, A. and M. Mohammed (2004). Imposing Order on Program Statements and its implication to AV Scanner. Proceedings of 11th IEEE Working Conference on Reverse Engineering, Delft, The Netherlands, IEEE Computer Society Press, Los Alamitos, CA.
-
(2004)
-
-
Lakhotia, A.1
Mohammed, M.2
-
13
-
-
14344262813
-
Obfuscation of Executable Code to Improve Resistance to Static Disassembly
-
Conference on Computer and Communications Security, Washington D.C., USA, ACM: Association for Computing Machinery
-
Linn, C. and S. Debray (2003). Obfuscation of Executable Code to Improve Resistance to Static Disassembly. Conference on Computer and Communications Security, Washington D.C., USA, ACM: Association for Computing Machinery.
-
(2003)
-
-
Linn, C.1
Debray, S.2
-
14
-
-
84896457528
-
A Physiological Decomposition of Virus and Worm Programs
-
Center for Advanced Computer Studies, University of Louisiana, Lafayette
-
Singh, P. K. (2002). A Physiological Decomposition of Virus and Worm Programs. Center for Advanced Computer Studies, University of Louisiana, Lafayette.
-
(2002)
-
-
Singh, P.K.1
-
15
-
-
84896472444
-
Defeating Polymorphism: Beyond Emulation
-
Virus Bulletin Conference
-
Stepan, A. E. (2005). Defeating Polymorphism: Beyond Emulation. Virus Bulletin Conference.
-
(2005)
-
-
Stepan, A.E.1
-
16
-
-
33645264610
-
Hunting for metamorphic
-
Virus Bulletin Conference, Prague, Czech Republic
-
Ször, P. and P. Ferrie (2001). Hunting for metamorphic. Virus Bulletin Conference, Prague, Czech Republic.
-
(2001)
-
-
Ször, P.1
Ferrie, P.2
-
17
-
-
84896477311
-
-
Vecna, 29A E-Zine
-
Vecna (1998). Miss Lexotan 8, 29A E-Zine.
-
(1998)
Miss Lexotan
, vol.8
-
-
-
18
-
-
34547197548
-
Normalizing Metamorphic Malware Using Term Rewriting
-
Sixth IEEE International Workshop on Source Code Analysis and Manipulation (SCAM 2006)
-
Walenstein, A., R. Mathur, et al. (2006). Normalizing Metamorphic Malware Using Term Rewriting. Sixth IEEE International Workshop on Source Code Analysis and Manipulation (SCAM 2006).
-
(2006)
-
-
Walenstein, A.1
Mathur, R.2
-
19
-
-
84896478312
-
-
ZOmbie. About reversing. VX Heavens
-
ZOmbie. About reversing. VX Heavens. http://vx.netlux.org/lib/vzo14.html.
-
-
-
-
20
-
-
84896478617
-
-
ZOmbie. Some ideas about metamorphism. VX Heavens
-
ZOmbie. Some ideas about metamorphism. VX Heavens. http://vx.netlux.org/lib/vzo20.html.
-
-
-
|