-
4
-
-
85156147536
-
Impeding malware analysis using conditional code obfuscation
-
M. I. Sharif, A. Lanzi, J. T. Giffin, and W. Lee, "Impeding Malware Analysis Using Conditional Code Obfuscation," in Network and Distributed System Security Symposium (NDSS), 2008.
-
(2008)
Network and Distributed System Security Symposium (NDSS)
-
-
Sharif, M.I.1
Lanzi, A.2
Giffin, J.T.3
Lee, W.4
-
5
-
-
70349141059
-
On the limits of information flow techniques for malware analysis and containment
-
L. Cavallaro, P. Saxena, and R. Sekar, "On the Limits of Information Flow Techniques for Malware Analysis and Containment," in 5th Conference on Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA), 2008.
-
(2008)
5th Conference on Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA)
-
-
Cavallaro, L.1
Saxena, P.2
Sekar, R.3
-
6
-
-
74049154670
-
Your Botnet is My Botnet: Analysis of a Botnet Takeover
-
B. Stone-Gross, M. Cova, L. Cavallaro, B. Gilbert, M. Szydlowski, R. Kemmerer, C. Kruegel, and G. Vigna, "Your Botnet is My Botnet: Analysis of a Botnet Takeover," in Conference on Computer and Communication Security (CCS), 2009.
-
(2009)
Conference on Computer and Communication Security (CCS)
-
-
Stone-Gross, B.1
Cova, M.2
Cavallaro, L.3
Gilbert, B.4
Szydlowski, M.5
Kemmerer, R.6
Kruegel, C.7
Vigna, G.8
-
8
-
-
77955197992
-
Malware RCE: Debuggers and decryptor development
-
M. Ligh and G. Sinclair, "Malware RCE: Debuggers and Decryptor Development," Defcon 16, 2008.
-
(2008)
Defcon
, vol.16
-
-
Ligh, M.1
Sinclair, G.2
-
10
-
-
85025141365
-
Binary code extraction and interface identification for security applications
-
February
-
J. Caballero, N. M. Johnson, S. McCamant, and D. Song, "Binary Code Extraction and Interface Identification for Security Applications," in Network and Distributed Systems Symposium (NDSS), February 2010.
-
(2010)
Network and Distributed Systems Symposium (NDSS)
-
-
Caballero, J.1
Johnson, N.M.2
McCamant, S.3
Song, D.4
-
12
-
-
79953672829
-
Dynamic taint analysis for automatic detection, analysis, and signaturegeneration of exploits on commodity software
-
J. Newsome and D. X. Song, "Dynamic Taint Analysis for Automatic Detection, Analysis, and SignatureGeneration of Exploits on Commodity Software," in Network and Distributed System Security Symposium (NDSS), 2005.
-
(2005)
Network and Distributed System Security Symposium (NDSS)
-
-
Newsome, J.1
Song, D.X.2
-
16
-
-
85043201839
-
Scalable, behavior-based malware clustering
-
U. Bayer, P. Milani Comparetti, C. Hlauschek, C. Kruegel, and E. Kirda, "Scalable, Behavior-Based Malware Clustering," in Network and Distributed System Security Symposium (NDSS), 2009.
-
(2009)
Network and Distributed System Security Symposium (NDSS)
-
-
Bayer, U.1
Milani Comparetti, P.2
Hlauschek, C.3
Kruegel, C.4
Kirda, E.5
-
17
-
-
85076206522
-
Effective and efficient malware detection at the end host
-
C. Kolbitsch, P. Milani Comparetti, C. Kruegel, E. Kirda, X. Zhou, and X. Wang, "Effective and Efficient Malware Detection at the End Host," in 18th Usenix Security Symposium, 2009.
-
(2009)
18th Usenix Security Symposium
-
-
Kolbitsch, C.1
Milani Comparetti, P.2
Kruegel, C.3
Kirda, E.4
Zhou, X.5
Wang, X.6
-
18
-
-
81855221759
-
ReFormat: Automatic reverse engineering of encrypted messages
-
Z. Wang, X. Jiang, W. Cui, X. Wang, and M. Grace, "ReFormat: Automatic Reverse Engineering of Encrypted Messages," in 14th European Symposium on Research in Computer Security (ESORICS), 2009.
-
(2009)
14th European Symposium on Research in Computer Security (ESORICS)
-
-
Wang, Z.1
Jiang, X.2
Cui, W.3
Wang, X.4
Grace, M.5
-
19
-
-
0027836576
-
Efficient software-based fault isolation
-
R. Wahbe, S. Lucco, T. E. Anderson, and S. L. Graham, "Efficient Software-based Fault Isolation," in 14th ACM Symposium on Operating Systems Principles (SOSP), 1993.
-
(1993)
14th ACM Symposium on Operating Systems Principles (SOSP)
-
-
Wahbe, R.1
Lucco, S.2
Anderson, T.E.3
Graham, S.L.4
-
21
-
-
84969564072
-
Oneway isolation: An effective approach for realizing safe execution environments
-
W. Sun, Z. Liang, V. Venkatakrishnan, and R. Sekar, "Oneway Isolation: An Effective Approach for Realizing Safe Execution Environments," in Network and Distributed Systems Symposium (NDSS), 2005.
-
(2005)
Network and Distributed Systems Symposium (NDSS)
-
-
Sun, W.1
Liang, Z.2
Venkatakrishnan, V.3
Sekar, R.4
-
22
-
-
69149106605
-
Native Client: A Sandbox for Portable, Untrusted x86 Native Code
-
B. Yee, D. Sehr, G. Dardyk, J. B. Chen, R. Muth, T. Ormandy, S. Okasaka, N. Narula, and N. Fullagar, "Native Client: A Sandbox for Portable, Untrusted x86 Native Code," in IEEE Symposium on Security and Privacy, 2009.
-
(2009)
IEEE Symposium on Security and Privacy
-
-
Yee, B.1
Sehr, D.2
Dardyk, G.3
Chen, J.B.4
Muth, R.5
Ormandy, T.6
Okasaka, S.7
Narula, N.8
Fullagar, N.9
-
23
-
-
84928140517
-
Measuring and detecting fast-flux service networks
-
T. Holz, C. Gorecki, K. Rieck, and F. C. Freiling, "Measuring and Detecting Fast-Flux Service Networks," in Proceedings of the 15th Annual Network & Distributed System Security Symposium (NDSS), 2008.
-
(2008)
Proceedings of the 15th Annual Network & Distributed System Security Symposium (NDSS)
-
-
Holz, T.1
Gorecki, C.2
Rieck, K.3
Freiling, F.C.4
-
26
-
-
77955194006
-
Pushdo/Cutwail Botnet: A study of the Pushdo/Cutwail Botnet
-
A. Decker, D. Sancho, L. Kharouni, M. Goncharov, and R. McArdle, "Pushdo/Cutwail Botnet: A study of the Pushdo/Cutwail Botnet," TrendMicro Labs, 2009.
-
(2009)
TrendMicro Labs
-
-
Decker, A.1
Sancho, D.2
Kharouni, L.3
Goncharov, M.4
McArdle, R.5
-
28
-
-
85084096033
-
On the spam campaign trail
-
C. Kreibich, C. Kanich, K. Levchenko, B. Enright, G. M. Voelker, V. Paxson, and S. Savage, "On the Spam Campaign Trail," in 1st Usenix Workshop on Large-Scale Exploits and Emergent Threats (LEET), 2008.
-
(2008)
1st Usenix Workshop on Large-Scale Exploits and Emergent Threats (LEET)
-
-
Kreibich, C.1
Kanich, C.2
Levchenko, K.3
Enright, B.4
Voelker, G.M.5
Paxson, V.6
Savage, S.7
-
29
-
-
65249165325
-
Spamming botnets: Signatures and characteristics
-
Y. Xie, F. Yu, K. Achan, R. Panigrahy, G. Hulten, and I. Osipkov, "Spamming Botnets: Signatures and Characteristics," SIGCOMM Comput. Commun. Rev., vol. 38, no. 4, 2008.
-
(2008)
SIGCOMM Comput. Commun. Rev.
, vol.38
, Issue.4
-
-
Xie, Y.1
Yu, F.2
Achan, K.3
Panigrahy, R.4
Hulten, G.5
Osipkov, I.6
-
30
-
-
85076932663
-
Studying spamming botnets using botlab
-
J. P. John, A. Moshchuk, S. D. Gribble, and A. Krishnamurthy, "Studying Spamming Botnets Using Botlab," in 6th USENIX Symposium on Networked Systems Design and Implementation (NSDI), 2009.
-
(2009)
6th USENIX Symposium on Networked Systems Design and Implementation (NSDI)
-
-
John, J.P.1
Moshchuk, A.2
Gribble, S.D.3
Krishnamurthy, A.4
-
32
-
-
84871121204
-
-
Finjan Malicious Code Research
-
Finjan Malicious Code Research, "Malware Analysis Trojan Banker URLZone/Bebloh," http://www.finjan.com/ MCRCblog.aspx?EntryId=2345, 2009.
-
(2009)
Malware Analysis Trojan Banker URLZone/Bebloh
-
-
-
33
-
-
77950788046
-
Panorama: Capturing system-wide information flow for malware detection and analysis
-
H. Yin, D. Song, M. Egele, C. Kruegel, and E. Kirda, "Panorama: Capturing System-wide Information Flow for Malware Detection and Analysis," in ACM Conference on Computer and Communication Security (CCS), 2007.
-
(2007)
ACM Conference on Computer and Communication Security (CCS)
-
-
Yin, H.1
Song, D.2
Egele, M.3
Kruegel, C.4
Kirda, E.5
-
34
-
-
84903607772
-
Dynamic spyware analysis
-
M. Egele, C. Kruegel, E. Kirda, H. Yin, and D. Song, "Dynamic Spyware Analysis," in Usenix Annual Technical Conference, 2007.
-
(2007)
Usenix Annual Technical Conference
-
-
Egele, M.1
Kruegel, C.2
Kirda, E.3
Yin, H.4
Song, D.5
-
35
-
-
85077680022
-
Behavior-based spyware detection
-
E. Kirda, C. Kruegel, G. Banks, G. Vigna, and R. Kemmerer, "Behavior-based Spyware Detection," in 15th Usenix Security Symposium, 2006.
-
(2006)
15th Usenix Security Symposium
-
-
Kirda, E.1
Kruegel, C.2
Banks, G.3
Vigna, G.4
Kemmerer, R.5
-
39
-
-
77952351839
-
The Geometry of Innocent Flesh on the Bone: Return-into-libc Without Function Calls (on the x86)
-
H. Shacham, "The Geometry of Innocent Flesh on the Bone: Return-into-libc Without Function Calls (on the x86)" in ACM Conference on Computer and Communications Security (CCS), 2007.
-
(2007)
ACM Conference on Computer and Communications Security (CCS)
-
-
Shacham, H.1
-
40
-
-
85029681162
-
Return-oriented rootkits: Bypassing kernel code integrity protection mechanisms
-
R. Hund, T. Holz, and F. Freiling, "Return-Oriented Rootkits: Bypassing Kernel Code Integrity Protection Mechanisms," in 18th USENIX Security Symposium, 2009.
-
(2009)
18th USENIX Security Symposium
-
-
Hund, R.1
Holz, T.2
Freiling, F.3
-
41
-
-
34547349153
-
Replayer: Automatic protocol replay by binary analysis
-
J. Newsome, D. Brumley, J. Franklin, and D. Song, "Replayer: Automatic Protocol Replay by Binary Analysis," in 13th ACM Conference on Computer and Communications Security (CCS), 2006.
-
(2006)
13th ACM Conference on Computer and Communications Security (CCS)
-
-
Newsome, J.1
Brumley, D.2
Franklin, J.3
Song, D.4
-
42
-
-
74049095923
-
Dispatcher: Enabling Active Botnet Infiltration using Automatic Protocol Reverse-Engineering
-
J. Caballero, P. Poosankam, C. Kreibich, and D. Song, "Dispatcher: Enabling Active Botnet Infiltration using Automatic Protocol Reverse-Engineering," in ACM Conference on Computer and Communication Security (CCS), 2009.
-
(2009)
ACM Conference on Computer and Communication Security (CCS)
-
-
Caballero, J.1
Poosankam, P.2
Kreibich, C.3
Song, D.4
-
43
-
-
58449129985
-
BitBlaze: A New Approach to Computer Security via Binary Analysis
-
D. Song, D. Brumley, H. Yin, J. Caballero, I. Jager, M. G. Kang, Z. Liang, J. Newsome, P. Poosankam, and P. Saxena, "BitBlaze: A New Approach to Computer Security via Binary Analysis," in 4th International Conference on Information Systems Security (ICISS), 2008.
-
(2008)
4th International Conference on Information Systems Security (ICISS)
-
-
Song, D.1
Brumley, D.2
Yin, H.3
Caballero, J.4
Jager, I.5
Kang, M.G.6
Liang, Z.7
Newsome, J.8
Poosankam, P.9
Saxena, P.10
|