-
1
-
-
0034269416
-
Attacking malicious code: A report to the infosec research council
-
G. McGraw and G. Morrisett, "Attacking malicious code: A report to the infosec research council", IEEE Software, 2000, 17(5), 33-44.
-
(2000)
IEEE Software
, vol.17
, Issue.5
, pp. 33-44
-
-
McGraw, G.1
Morrisett, G.2
-
2
-
-
34247166239
-
Static detection of malicious code in executable programs
-
Citeseer
-
Bergeron, J.; Debbabi, M.; Desharnais, J.; Erhioui, M.; Lavoie, Y. & Tawbi, N., "Static detection of malicious code in executable programs", In Symposium on Requirements Engineering for Information Security, Citeseer, 2001, 184-189.
-
(2001)
Symposium on Requirements Engineering for Information Security
, pp. 184-189
-
-
Bergeron, J.1
Debbabi, M.2
Desharnais, J.3
Erhioui, M.4
Lavoie, Y.5
Tawbi, N.6
-
3
-
-
79952060600
-
Survey on Malware detection methods
-
Vinod, P.; Jaipur, R.; Laxmi, V. & Gaur, M., "Survey on Malware Detection Methods", Hack. 2009, 74.
-
(2009)
Hack
, pp. 74
-
-
Vinod, P.1
Jaipur, R.2
Laxmi, V.3
Gaur, M.4
-
4
-
-
23744485744
-
Testing Malware detectors
-
Boston, MA, USA, ACM Press
-
M. Christodorescu and S. Jha, "Testing malware detectors", In Proceedings of the 2004 ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA 2004), Boston, MA, USA, ACM Press, 2004, 34-44.
-
(2004)
Proceedings of the 2004 ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA 2004)
, pp. 34-44
-
-
Christodorescu, M.1
Jha, S.2
-
5
-
-
84924223669
-
Static analysis of executables to detect malicious patterns
-
Christodorescu, M. & Jha, S., "Static analysis of executables to detect malicious patterns", Proceedings of the 12th conference on USENIX Security Symposium, 2003, 12, 169-186.
-
(2003)
Proceedings of the 12th Conference on USENIX Security Symposium
, vol.12
, pp. 169-186
-
-
Christodorescu, M.1
Jha, S.2
-
6
-
-
84867827770
-
Effective digital forensic analysis of the NTFS disk image
-
Alazab, M.; Venkatraman, S. & Watters, P., "Effective digital forensic analysis of the NTFS disk image", Ubiquitous Computing and Communication Journal, 2009, 4, 1.
-
(2009)
Ubiquitous Computing and Communication Journal
, vol.4
, pp. 1
-
-
Alazab, M.1
Venkatraman, S.2
Watters, P.3
-
8
-
-
78649863906
-
-
IEEE Computer Society, ISBN 9957-8583-0-0
-
Alazab, M., Venkatraman, S. and Watters, P., 'Digital Forensic Techniques for Static Analysis of NTFS Images, Proceedings of International Conference on Information Technology (ICIT2009). IEEE Computer Society, ISBN 9957-8583-0-0. 2009.
-
(2009)
Digital Forensic Techniques for Static Analysis of NTFS Images, Proceedings of International Conference on Information Technology (ICIT2009)
-
-
Alazab, M.1
Venkatraman, S.2
Watters, P.3
-
9
-
-
57049186367
-
Eureka: A framework for enabling static Malware analysis
-
Springer
-
Sharif, M.; Yegneswaran, V.; Saidi, H.; Porras, P. & Lee, W., "Eureka: A framework for enabling static malware analysis", Computer Security - ESORICS, Lecture Notes in Computer Science LNCS, Springer, 2008, 5283/2008, 481-500.
-
(2008)
Computer Security - ESORICS, Lecture Notes in Computer Science LNCS
, vol.5283
, Issue.2008
, pp. 481-500
-
-
Sharif, M.1
Yegneswaran, V.2
Saidi, H.3
Porras, P.4
Lee, W.5
-
10
-
-
38349021089
-
Dynamic software birthmarks to detect the theft of windows applications
-
Tamada, H.; Okamoto, K.; Nakamura, M.; Monden, A. & Matsumoto, K., M, "Dynamic software birthmarks to detect the theft of windows applications", International Symposium on Future Software Technology, 2004.
-
(2004)
International Symposium on Future Software Technology
-
-
Tamada, H.1
Okamoto, K.2
Nakamura, M.3
Monden, A.4
Matsumoto, K.M.5
-
11
-
-
38349055953
-
Dynamic software birthmarks based on API calls
-
J89-D
-
Okamoto, K.; Tamada, H.; Nakamura, M.; Monden, A. & Matsumoto, K., "Dynamic Software Birthmarks Based on API Calls", IEICE Transactions on Information and Systems, 2006, J89-D, 1751-1763.
-
(2006)
IEICE Transactions on Information and Systems
, pp. 1751-1763
-
-
Okamoto, K.1
Tamada, H.2
Nakamura, M.3
Monden, A.4
Matsumoto, K.5
-
12
-
-
38348998898
-
A static birthmark of binary executables based on API call structure
-
Springer
-
Choi, S.; Park, H.; Lim, H. & Han, T., "A static birthmark of binary executables based on API call structure", Advances in Computer Science - ASIAN 2007. Computer and Network Security, Lecture Notes in Computer Science LNCS, Springer, 2008, 4846/2008, 2-16.
-
(2008)
Advances in Computer Science - ASIAN 2007. Computer and Network Security, Lecture Notes in Computer Science LNCS
, vol.4846
, Issue.2008
, pp. 2-16
-
-
Choi, S.1
Park, H.2
Lim, H.3
Han, T.4
-
13
-
-
67650701354
-
Malware detection based on suspicious behavior identification
-
International Workshop on, IEEE Computer Society
-
Wang, C.; Pang, J.; Zhao, R.; Fu, W. & Liu, X., "Malware Detection Based on Suspicious Behavior Identification", Education Technology and Computer Science, International Workshop on, IEEE Computer Society, 2009, 2, 198-202.
-
(2009)
Education Technology and Computer Science
, vol.2
, pp. 198-202
-
-
Wang, C.1
Pang, J.2
Zhao, R.3
Fu, W.4
Liu, X.5
-
14
-
-
33745456200
-
Fileprints: Identifying file types by n-gram analysis
-
Li, W.; Wang, K.; Stolfo, S. & Herzog, B., "Fileprints: Identifying file types by n-gram analysis", the Proceedings of the 2005 IEEE Workshop on Information Assurance and Security, 2005.
-
(2005)
The Proceedings of the 2005 IEEE Workshop on Information Assurance and Security
-
-
Li, W.1
Wang, K.2
Stolfo, S.3
Herzog, B.4
-
15
-
-
78649813950
-
Autonomic context-dependent architecture for Malware detection
-
ISBN 978-986-83038-3-6, 8-10 January, Singapore
-
Venkatraman, S., "Autonomic Context-Dependent Architecture for Malware Detection", Proceedings of International Conference on e-Technology (e-Tech2009), International Business Academics Consortium, ISBN 978-986-83038-3-6, 8-10 January, Singapore, 2009, 2927-2947.
-
(2009)
Proceedings of International Conference on E-Technology (e-Tech2009), International Business Academics Consortium
, pp. 2927-2947
-
-
Venkatraman, S.1
-
16
-
-
78649836245
-
-
Malware Research and Response at Microsoft.pdf, August
-
Microsoft, 2007, "Understanding Anti-Malware Technologies", http://download.microsoft.com/download/0/c/0/0c040c8f-2109-4760-a750- 96443fd14ef2/Understanding Malware Research and Response at Microsoft.pdf, August 2009.
-
(2007)
Understanding Anti-Malware Technologies
-
-
-
17
-
-
33746406796
-
Detecting self-mutating Malware using control-flow graph matching
-
Springer
-
Bruschi, D.; Martignoni, L. & Monga, M., "Detecting self-mutating malware using control-flow graph matching", Lecture Notes in Computer Science, Springer, 2006, 4064, 129.
-
(2006)
Lecture Notes in Computer Science
, vol.4064
, pp. 129
-
-
Bruschi, D.1
Martignoni, L.2
Monga, M.3
-
18
-
-
78649876233
-
-
MetaPHOR August
-
MetaPHOR, http://securityresponse.symantec.com/avcenter/venc/data/w32. simile.html, August 2009.
-
(2009)
-
-
-
21
-
-
84871400671
-
-
Trends for january 06 - june 06. X
-
Turner, D. Semantic internet security threat report: Trends for january 06 - june 06. X. http://eval.symantec.com/mktginfo/enterprise/white-papers/ent- whitepaper-symantec-internet-security-threat-report-x-09-2006.en-us.pdf. 2006.
-
(2006)
Semantic Internet Security Threat Report
-
-
Turner, D.1
-
22
-
-
78649898800
-
-
NEOx March
-
NEOx, PE Tools, http://www.uinc.ru, March 2010.
-
(2010)
PE Tools
-
-
-
23
-
-
34748820878
-
PolyUnpack: Automating the hidden-code extraction of unpack-executing Malware
-
IEEE Computer Society
-
Royal, P.; Halpin, M.; Dagon, D.; Edmonds, R. & Lee, W., "PolyUnpack: Automating the Hidden-Code Extraction of Unpack-Executing Malware", IEEE Computer Society, the 22nd Annual Computer Security Applications Conference (ACSAC'06), 2006, 289-300.
-
(2006)
The 22nd Annual Computer Security Applications Conference (ACSAC'06)
, pp. 289-300
-
-
Royal, P.1
Halpin, M.2
Dagon, D.3
Edmonds, R.4
Lee, W.5
-
24
-
-
70349448915
-
Renovo: A hidden code extractor for packed executables
-
Kang, M.; Poosankam, P. & Yin, H. "Renovo: A hidden code extractor for packed executables", Workshop On Rapid Malcode WORM'07 Proceedings of the 2007 ACM workshop on Recurring malcode, 2007, 46 - 53.
-
(2007)
Workshop on Rapid Malcode WORM'07 Proceedings of the 2007 ACM Workshop on Recurring Malcode
, pp. 46-53
-
-
Kang, M.1
Poosankam, P.2
Yin, H.3
-
25
-
-
48649084773
-
OmniUnpack: Fast, generic, and safe unpacking of Malware
-
Martignoni, L.; Christodorescu, M. & Jha, S., "OmniUnpack: Fast, Generic, and Safe Unpacking of Malware", Proceedings of the Annual Computer Security Applications Conference (ACSAC), 2007.
-
(2007)
Proceedings of the Annual Computer Security Applications Conference (ACSAC)
-
-
Martignoni, L.1
Christodorescu, M.2
Jha, S.3
-
26
-
-
70349240080
-
Ether: Malware analysis via hardware virtualization extensions
-
Dinaburg, A.; Royal, P.; Sharif, M. & Lee, W., "Ether: Malware analysis via hardware virtualization extensions", Proceedings of the 15th ACM conference on Computer and communications security, 2008, 51-62.
-
(2008)
Proceedings of the 15th ACM Conference on Computer and Communications Security
, pp. 51-62
-
-
Dinaburg, A.1
Royal, P.2
Sharif, M.3
Lee, W.4
-
27
-
-
78649832908
-
-
Snaker, Qwerton, Jibz & xineohP
-
Snaker, Qwerton, Jibz & xineohP, PEiD, http://www.peid.info/, 2008.
-
(2008)
-
-
-
28
-
-
54049099646
-
Revealing packed Malware
-
Yan, W.; Zhang, Z.; Ansari, N. & Micro, T., "Revealing packed malware", IEEE Security & Privacy, 2008, 6, 65-69.
-
(2008)
IEEE Security & Privacy
, vol.6
, pp. 65-69
-
-
Yan, W.1
Zhang, Z.2
Ansari, N.3
Micro, T.4
-
30
-
-
78649878795
-
-
February
-
SQLite, www.sqlite.org/, February 2010.
-
(2010)
-
-
-
31
-
-
78649845887
-
-
Windows API Functions January
-
Windows API Functions, MSDN, http://msdn.microsoft.com/en-us/library/ aa383749%28VS.85%29.aspx. January 2010.
-
(2010)
-
-
-
32
-
-
78649863905
-
Investigation techniques for static analysis of NTFS file system images
-
Internet Security, University of Ballarat
-
Alazab, M., "Investigation techniques for static analysis of NTFS file system images", 2009 Annual Research Conference, Internet Security, University of Ballarat.
-
2009 Annual Research Conference
-
-
Alazab, M.1
-
33
-
-
45849099815
-
Forensic artifacts of microsoft windows vista system
-
Springer
-
Purcell, D. & Lang, S., "Forensic Artifacts of Microsoft Windows Vista System", Lecture Notes in Computer Science, Springer, 2008, 5075, 304-319.
-
(2008)
Lecture Notes in Computer Science
, vol.5075
, pp. 304-319
-
-
Purcell, D.1
Lang, S.2
-
34
-
-
70349518917
-
Using API sequence and bayes algorithm to detect suspicious behavior
-
Wang, C.; Pang, J.; Zhao, R. & Liu, X. "Using API Sequence and Bayes Algorithm to Detect Suspicious Behavior", 2009 International Conference on Communication Software and Networks, 2009, 544-548.
-
(2009)
2009 International Conference on Communication Software and Networks
, pp. 544-548
-
-
Wang, C.1
Pang, J.2
Zhao, R.3
Liu, X.4
-
35
-
-
63149135419
-
A static API birthmark for windows binary executables
-
Elsevier
-
Choi, S.; Park, H.; Lim, H. & Han, T., "A static API birthmark for Windows binary executables", Journal of Systems and Software, Elsevier, 2009, 82, 862-873.
-
(2009)
Journal of Systems and Software
, vol.82
, pp. 862-873
-
-
Choi, S.1
Park, H.2
Lim, H.3
Han, T.4
-
36
-
-
84882697421
-
Towards stealthy Malware detection
-
Springer
-
Stolfo, S.; Wang, K. & Li, W., "Towards Stealthy Malware Detection", Malware Detection, Springer, 2007, 27, 231-249.
-
(2007)
Malware Detection
, vol.27
, pp. 231-249
-
-
Stolfo, S.1
Wang, K.2
Li, W.3
-
37
-
-
58149103803
-
An automatic anti-anti-VMware technique applicable for multi-stage packed Malware
-
MALWARE 2008. 3rd International Conference on
-
Sun, L.; Ebringer, T. & Boztas, S., "An automatic anti-anti-VMware technique applicable for multi-stage packed malware", Malicious and Unwanted Software, 2008. MALWARE 2008. 3rd International Conference on, 2008, 17-23.
-
(2008)
Malicious and Unwanted Software, 2008
, pp. 17-23
-
-
Sun, L.1
Ebringer, T.2
Boztas, S.3
|