-
1
-
-
78249273139
-
-
Threatexpert3, http://www.threatexpert.com/
-
-
-
-
2
-
-
78249246960
-
-
Norman sandbox center (2008), http://www.norman.com/security-center/ security-tools/en
-
(2008)
-
-
-
3
-
-
78249278957
-
-
VX Heavens (2010), http://vx.netlux.org/
-
(2010)
-
-
-
5
-
-
38149089416
-
Automated classification and analysis of internet malware
-
Kruegel, C., Lippmann, R., Clark, A. (eds.) RAID 2007. Springer, Heidelberg
-
Bailey, M., Oberheide, J., Andersen, J., Mao, Z.M., Jahanian, F., Nazario, J.: Automated classification and analysis of internet malware. In: Kruegel, C., Lippmann, R., Clark, A. (eds.) RAID 2007. LNCS, vol. 4637, pp. 178-197. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4637
, pp. 178-197
-
-
Bailey, M.1
Oberheide, J.2
Andersen, J.3
Mao, Z.M.4
Jahanian, F.5
Nazario, J.6
-
6
-
-
85043201839
-
Scalable, behavior-based malware clustering
-
Bayer, U., Comparetti, P.M., Hlauschek, C., Kruegel, C., Kirda, E.: Scalable, behavior-based malware clustering. In: Proceedings of the Network and Distributed System Security Symposium (2009)
-
Proceedings of the Network and Distributed System Security Symposium (2009)
-
-
Bayer, U.1
Comparetti, P.M.2
Hlauschek, C.3
Kruegel, C.4
Kirda, E.5
-
10
-
-
78249237743
-
-
Ha, K.: Keylogger.stawin, http://www.symantec.com/security-response/ writeup.jsp?docid=2004-012915-2315-99
-
Keylogger.stawin
-
-
Ha, K.1
-
12
-
-
0036648690
-
Ccfinder: A multi-linguistic token-based code clone detection system for large scale source code
-
Kamiya, T., Kusumoto, S., Inoue, K.: Ccfinder: A multi-linguistic token-based code clone detection system for large scale source code. IEEE Trans. on Software Engineering, 654-670 (2002)
-
(2002)
IEEE Trans. on Software Engineering
, pp. 654-670
-
-
Kamiya, T.1
Kusumoto, S.2
Inoue, K.3
-
14
-
-
78249252524
-
-
McAfee.
-
McAfee. W97m/opey.c, http://vil.nai.com/vil/content/v-10290.htm
-
W97m/opey.c
-
-
-
15
-
-
85076751448
-
Behavioral clustering of http-based malware and signature generation using malicious network traces
-
Perdisci, R., Lee, W., Feamster, N.: Behavioral clustering of http-based malware and signature generation using malicious network traces. In: USENIX Symposium on Networked Systems Design and Implementation, NSDI 2010 (2010)
-
USENIX Symposium on Networked Systems Design and Implementation, NSDI 2010 (2010)
-
-
Perdisci, R.1
Lee, W.2
Feamster, N.3
-
16
-
-
49949090311
-
Learning and classification of malware behavior
-
Zamboni, D. (ed.) DIMVA 2008. Springer, Heidelberg
-
Rieck, K., Holz, T., Willems, C., Dussel, P., Laskov, P.: Learning and classification of malware behavior. In: Zamboni, D. (ed.) DIMVA 2008. LNCS, vol. 5137, pp. 108-125. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5137
, pp. 108-125
-
-
Rieck, K.1
Holz, T.2
Willems, C.3
Dussel, P.4
Laskov, P.5
-
17
-
-
78249275730
-
-
Technical Report 18-2009, Berlin Institute of Technology
-
Rieck, K., Trinius, P., Willems, C., Holz, T.: Automatic analysis of malware behavior using machine learning. Technical Report 18-2009, Berlin Institute of Technology (2009)
-
(2009)
Automatic Analysis of Malware Behavior Using Machine Learning
-
-
Rieck, K.1
Trinius, P.2
Willems, C.3
Holz, T.4
-
18
-
-
58449129985
-
Bitblaze: A new approach to computer security via binary analysis
-
Song, D., Brumley, D., Yin, H., Caballero, J., Jager, I., Kang, M.G., Liang, Z., Newsome, J., Poosankam, P., Saxena, P.: Bitblaze: A new approach to computer security via binary analysis. In: Proceedings of the 4th International Conference on Information Systems Security (December 2008)
-
Proceedings of the 4th International Conference on Information Systems Security (December 2008)
-
-
Song, D.1
Brumley, D.2
Yin, H.3
Caballero, J.4
Jager, I.5
Kang, M.G.6
Liang, Z.7
Newsome, J.8
Poosankam, P.9
Saxena, P.10
-
19
-
-
78249232188
-
-
Symantec. Spyware.e2give, http://www.symantec.com/security-response/ writeup.jsp?docid=2004-102614-1006-99
-
Spyware.e2give
-
-
-
20
-
-
78249280167
-
-
Symantec. Xeram.1664, http://www.symantec.com/security response/ writeup.jsp?docid=2000-121913-2839-99
-
Xeram.1664
-
-
-
21
-
-
38349021089
-
Dynamic software birthmarks to detect the theft of windows applications
-
Tamada, H., Okamoto, K., Nakamura, M., Monden, A., Matsumoto, K.: Dynamic software birthmarks to detect the theft of windows applications. In: International Symposium on Future Software Technology (2004)
-
International Symposium on Future Software Technology (2004)
-
-
Tamada, H.1
Okamoto, K.2
Nakamura, M.3
Monden, A.4
Matsumoto, K.5
-
22
-
-
25144439604
-
-
Addison-Wesley, Reading
-
Tan, P., Steinbach, M., Kumar, V.: Introduction to Data Mining. Addison-Wesley, Reading (2006)
-
(2006)
Introduction to Data Mining
-
-
Tan, P.1
Steinbach, M.2
Kumar, V.3
-
23
-
-
77950834638
-
Detecting software theft via system call based birthmarks
-
Wang, X., Jhi, Y., Zhu, S., Liu, P.: Detecting software theft via system call based birthmarks. In: Proceedings of 25th Annual Computer Security Applications Conference (2009)
-
Proceedings of 25th Annual Computer Security Applications Conference (2009)
-
-
Wang, X.1
Jhi, Y.2
Zhu, S.3
Liu, P.4
-
24
-
-
0025417991
-
Identification of program similarity in large populations
-
Computer Journal
-
Whale, G.: Identification of program similarity in large populations. Computer Journal, Special Issue on Procedural Programming, 140-146 (1990)
-
(1990)
Procedural Programming
, Issue.SPEC. ISSUE
, pp. 140-146
-
-
Whale, G.1
-
25
-
-
34047110218
-
Toward automated dynamic malware analysis using cwsandbox
-
Willems, C., Holz, T., Freiling, F.: Toward automated dynamic malware analysis using cwsandbox. In: Proceedings of the 2007 IEEE Symposium on Security and Privacy (S&P 2007), pp. 32-39 (2007)
-
(2007)
Proceedings of the 2007 IEEE Symposium on Security and Privacy (S&P 2007)
, pp. 32-39
-
-
Willems, C.1
Holz, T.2
Freiling, F.3
|