-
2
-
-
77955225451
-
Here comes the flood or end of the pattern file
-
Ottawa
-
D. Perry, "Here comes the flood or end of the pattern file," in Virus Bulletin (VB2008), Ottawa, 2008.
-
(2008)
Virus Bulletin (VB2008)
-
-
Perry, D.1
-
3
-
-
27544433210
-
Semantics-aware malware detection
-
Washington, DC, USA: IEEE Computer Society
-
M. Christodorescu, S. Jha, S. A. Seshia, D. Song, and R. E. Bryant, "Semantics-aware malware detection," in Proceedings of the 2005 IEEE Symposium on Security and Privacy (S&P'06). Washington, DC, USA: IEEE Computer Society, 2005, pp. 32-46.
-
(2005)
Proceedings of the 2005 IEEE Symposium on Security and Privacy (S&P'06)
, pp. 32-46
-
-
Christodorescu, M.1
Jha, S.2
Seshia, S.A.3
Song, D.4
Bryant, R.E.5
-
4
-
-
84903607772
-
Dynamic spyware analysis
-
USENIX
-
M. Egele, C. Kruegel, E. Kirda, H. Yin, , and D. Song, "Dynamic spyware analysis," in Proceedings of the 2007 USENIX Annual Technical Conference (USENIX'07). USENIX, 2007, pp. 233-246.
-
(2007)
Proceedings of the 2007 USENIX Annual Technical Conference (USENIX'07)
, pp. 233-246
-
-
Egele, M.1
Kruegel, C.2
Kirda, E.3
Yin, H.4
Song, D.5
-
5
-
-
85076206522
-
Effective and efficient malware detection at the end host
-
August
-
C. Kolbitsch, P. M. Comparetti, C. Kruegel, E. Kirda, X. Zhou, and X. Wang, "Effective and efficient malware detection at the end host," in Proceedings of the 18th USENIX Security Symposium (Security'09), August 2009.
-
(2009)
Proceedings of the 18th USENIX Security Symposium (Security'09)
-
-
Kolbitsch, C.1
Comparetti, P.M.2
Kruegel, C.3
Kirda, E.4
Zhou, X.5
Wang, X.6
-
6
-
-
58449115871
-
BitScope: Automatically dissecting malicious binaries
-
Mar.
-
D. Brumley, C. Hartwig, M. G. Kang, Z. L. J. Newsome, P. Poosankam, D. Song, and H. Yin, "BitScope: Automatically dissecting malicious binaries," School of Computer Science, Carnegie Mellon University, Tech. Rep. CMU-CS07-133, Mar. 2007.
-
(2007)
School of Computer Science, Carnegie Mellon University, Tech. Rep. CMU-CS07-133
-
-
Brumley, D.1
Hartwig, C.2
Kang, M.G.3
Newsome, Z.L.J.4
Poosankam, P.5
Song, D.6
Yin, H.7
-
7
-
-
34548737161
-
Exploring multiple execution paths for malware analysis
-
IEEE Computer Society
-
A. Moser, C. Kruegel, and E. Kirda, "Exploring multiple execution paths for malware analysis," in Proceedings of the 2007 IEEE Symposium on Security and Privacy (S&P'07). IEEE Computer Society, 2007, pp. 231-245.
-
(2007)
Proceedings of the 2007 IEEE Symposium on Security and Privacy (S&P'07)
, pp. 231-245
-
-
Moser, A.1
Kruegel, C.2
Kirda, E.3
-
8
-
-
57149124218
-
Mining significant graph patterns by leap search
-
New York, NY, USA: ACM Press
-
X. Yan, H. Cheng, J. Han, and P. S. Yu, "Mining significant graph patterns by leap search," in Proceedings of the 2008 ACM SIGMOD International Conference on Management of Data (SIGMOD'08). New York, NY, USA: ACM Press, 2008, pp. 433-444.
-
(2008)
Proceedings of the 2008 ACM SIGMOD International Conference on Management of Data (SIGMOD'08)
, pp. 433-444
-
-
Yan, X.1
Cheng, H.2
Han, J.3
Yu, P.S.4
-
9
-
-
0000398336
-
Restructuring lattice theory: An approach based on hierarchies of concepts
-
R. Wille, "Restructuring lattice theory: an approach based on hierarchies of concepts," Ordered Sets, 1982.
-
(1982)
Ordered Sets
-
-
Wille, R.1
-
10
-
-
38149089416
-
Automated classification and analysis of internet malware
-
Springer
-
M. Bailey, J. Oberheide, J. Andersen, Z. M. Mao, R Jahanian, and J. Nazario, "Automated classification and analysis of internet malware," in Proceedings of the 10th International Symposium on Recent Advances in Intrusion Detection (RAID'07). Springer, 2007, pp. 178-197.
-
(2007)
Proceedings of the 10th International Symposium on Recent Advances in Intrusion Detection (RAID'07)
, pp. 178-197
-
-
Bailey, M.1
Oberheide, J.2
Andersen, J.3
Mao, Z.M.4
Jahanian, R.5
Nazario, J.6
-
11
-
-
49949090311
-
Learning and classification of malware behavior
-
Springer
-
K. Rieck, T. HoIz, C. Willems, P. Dussel, and P. Laskov, "Learning and classification of malware behavior," in Proceedings of the 5th Conference on Detection of Intrusions and Malware and Vulnerability Assessment (DIMVA'08). Springer, 2008, pp. 108-125.
-
(2008)
Proceedings of the 5th Conference on Detection of Intrusions and Malware and Vulnerability Assessment (DIMVA'08)
, pp. 108-125
-
-
Rieck, K.1
HoIz, T.2
Willems, C.3
Dussel, P.4
Laskov, P.5
-
12
-
-
0038262825
-
Precise dynamic slicing algorithms
-
Washington, DC, USA: IEEE Computer Society
-
X. Zhang, R. Gupta, and Y. Zhang, "Precise dynamic slicing algorithms," in Proceedings of the 25th International Conference on Software Engineering (ICSE '03). Washington, DC, USA: IEEE Computer Society, 2003, pp. 319-329.
-
(2003)
Proceedings of the 25th International Conference on Software Engineering (ICSE '03)
, pp. 319-329
-
-
Zhang, X.1
Gupta, R.2
Zhang, Y.3
-
13
-
-
77955197991
-
-
"Symantec security response," http://www.symantec.com/business/ security-response/index.jsp.
-
-
-
-
15
-
-
77950788046
-
Panorama: Capturing system-wide information flow for malware detection and analysis
-
H. Yin, D. Song, M. Egele, C. Kruegel, and E. Kirda, "Panorama: Capturing system-wide information flow for malware detection and analysis," in Proceedings of the 14th ACM Conference on Computer and Communications Security (CCS'07), 2007.
-
(2007)
Proceedings of the 14th ACM Conference on Computer and Communications Security (CCS'07)
-
-
Yin, H.1
Song, D.2
Egele, M.3
Kruegel, C.4
Kirda, E.5
-
16
-
-
37849017546
-
Mining specifications of malicious behavior
-
New York, NY, USA: ACM Press
-
M. Christodorescu, S. Jha, and C. Kruegel, "Mining specifications of malicious behavior," in Proceedings of the 6th Joint Meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering (ESEC/FSE'07). New York, NY, USA: ACM Press, 2007, pp. 5-14.
-
(2007)
Proceedings of the 6th Joint Meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering (ESEC/FSE'07)
, pp. 5-14
-
-
Christodorescu, M.1
Jha, S.2
Kruegel, C.3
-
17
-
-
0009793176
-
-
Microsoft Corporation
-
Microsoft Corporation, "MSDN Library," http: //msdn.microsoft.com/en-us/library/default.aspx.
-
MSDN Library
-
-
-
19
-
-
0033328495
-
A fast algorithm for building lattices
-
L. Nourine and O. Raynaud, "A fast algorithm for building lattices," Inf. Process. Lett., vol. 71, no. 5-6, pp. 199-204, 1999.
-
(1999)
Inf. Process. Lett.
, vol.71
, Issue.5-6
, pp. 199-204
-
-
Nourine, L.1
Raynaud, O.2
-
20
-
-
31844436472
-
-
BindView, "Strace for NT," http://www.bindview.com.
-
Strace for NT
-
-
-
22
-
-
8644273520
-
An environment for controlled worm replication and analysis
-
I. Whalley, B. Arnold, D. Chess, J. Morar, A. Segal, and M. Swimmer, "An environment for controlled worm replication and analysis," in Virus Bulletin Conference, 2000.
-
(2000)
Virus Bulletin Conference
-
-
Whalley, I.1
Arnold, B.2
Chess, D.3
Morar, J.4
Segal, A.5
Swimmer, M.6
-
24
-
-
77955202624
-
"Top internet security suites: Paying for protection
-
January
-
E. Larkin, "Top internet security suites: Paying for protection," PC Magazine, January 2009.
-
(2009)
PC Magazine
-
-
Larkin, E.1
-
31
-
-
67650401454
-
-
Ph.D. dissertation, Technischen Universitat Darmstadt, Darmstadt, Germany, Oct.
-
S. Yevtushenko, "Computing and visualizing concept lattices," Ph.D. dissertation, Technischen Universitat Darmstadt, Darmstadt, Germany, Oct. 2004.
-
(2004)
Computing and Visualizing Concept Lattices
-
-
Yevtushenko, S.1
-
33
-
-
70350652406
-
Digging for data structures
-
A. Cozzie, R Stratton, H. Xue, and S. T. King, "Digging for data structures," in Proceedings of the 8th USENIX Symposium on OS Design and Implementation (OSDI'08), 2008.
-
(2008)
Proceedings of the 8th USENIX Symposium on OS Design and Implementation (OSDI'08)
-
-
Cozzie, A.1
Stratton, R.2
Xue, H.3
King, S.T.4
-
35
-
-
0036038253
-
Mining specifications
-
New York, NY, USA: ACM Press
-
G. Ammons, R. Bodik, and J. R. Larus, "Mining specifications," in Proceedings of the 29th Annual ACM SIGPLANSIGACT Symposium on Principles of Programming Languages (POPL'02). New York, NY, USA: ACM Press, 2002, pp. 4-16.
-
(2002)
Proceedings of the 29th Annual ACM SIGPLANSIGACT Symposium on Principles of Programming Languages (POPL'02)
, pp. 4-16
-
-
Ammons, G.1
Bodik, R.2
Larus, J.R.3
-
36
-
-
34548219459
-
Static specification mining using automata-based abstractions
-
New York, NY, USA: ACM Press
-
S. Shoham, E. Yahav, S. Fink, and M. Pistoia, "Static specification mining using automata-based abstractions," in Proceedings of the ACM SIGSOFT International Symposium on Software Testing and Analysis 2007 (ISSTA'07). New York, NY, USA: ACM Press, 2007, pp. 174-184.
-
(2007)
Proceedings of the ACM SIGSOFT International Symposium on Software Testing and Analysis 2007 (ISSTA'07)
, pp. 174-184
-
-
Shoham, S.1
Yahav, E.2
Fink, S.3
Pistoia, M.4
-
37
-
-
57349129534
-
Mining library specifications using inductive logic programming
-
New York, NY, USA: ACM Press
-
S. Sankaranarayanan, R Ivanči, and A. Gupta, "Mining library specifications using inductive logic programming," in Proceedings of the 30th International Conference on Software Engineering (ICSE '08). New York, NY, USA: ACM Press, 2008, pp. 131-140.
-
(2008)
Proceedings of the 30th International Conference on Software Engineering (ICSE '08)
, pp. 131-140
-
-
Sankaranarayanan, S.1
Ivanči, R.2
Gupta, A.3
-
38
-
-
34548734722
-
Mining security-sensitive operations in legacy code using concept analysis
-
Washington, DC, USA: IEEE Computer Society
-
V. Ganapathy, D. King, T. Jaeger, and S. Jha, "Mining security-sensitive operations in legacy code using concept analysis," in Proceedings of the 29th International Conference on Software Engineering (ICSE '07). Washington, DC, USA: IEEE Computer Society, 2007, pp. 458-467.
-
(2007)
Proceedings of the 29th International Conference on Software Engineering (ICSE '07)
, pp. 458-467
-
-
Ganapathy, V.1
King, D.2
Jaeger, T.3
Jha, S.4
-
39
-
-
0032218209
-
Reengineering class hierarchies using concept analysis
-
New York, NY, USA: ACM Press
-
G. Snelting and R Tip, "Reengineering class hierarchies using concept analysis," in SIGSOFT '98/FSE-6: Proceedings of the 6th ACM SIGSOFT international symposium on Foundations of software engineering. New York, NY, USA: ACM Press, 1998, pp. 99-110.
-
(1998)
SIGSOFT '98/FSE-6: Proceedings of the 6th ACM SIGSOFT International Symposium on Foundations of Software Engineering
, pp. 99-110
-
-
Snelting, G.1
Tip, R.2
-
40
-
-
0035307244
-
Concept analysis for module restructuring
-
P. Tonella, "Concept analysis for module restructuring," IEEE Transactions on Software Engineering, vol. 27, no. 4, pp. 351-363, 2001.
-
(2001)
IEEE Transactions on Software Engineering
, vol.27
, Issue.4
, pp. 351-363
-
-
Tonella, P.1
-
41
-
-
0041848279
-
Using a concept lattice of decomposition slices for program understanding and impact analysis
-
-, "Using a concept lattice of decomposition slices for program understanding and impact analysis," IEEE Transactions on Software Engineering, vol. 29, no. 6, pp. 495-509, 2003.
-
(2003)
IEEE Transactions on Software Engineering
, vol.29
, Issue.6
, pp. 495-509
-
-
|