-
3
-
-
33751064824
-
Hamsa: Fast signature generation for zero-day polymorphic worms with provable attack resilience
-
Z. Li, M. Sanghi, B. Chavez, Y. Chen, and M.-Y. Kao, "Hamsa: Fast signature generation for zero-day polymorphic worms with provable attack resilience," in Proceedings of the 2006 IEEE Symposium on Security and Privacy (S&P), 2006.
-
(2006)
Proceedings of the 2006 IEEE Symposium on Security and Privacy (S&P)
-
-
Li, Z.1
Sanghi, M.2
Chavez, B.3
Chen, Y.4
Kao, M.-Y.5
-
5
-
-
84991765629
-
Automated worm fingerprinting
-
S. Singh, C. Estan, G. Varghese, and S. Savage, "Automated worm fingerprinting," in Proceedings of the 6th ACM/USENIX Symposium on Operating System Design and Implementation (OSDI), 2004.
-
(2004)
Proceedings of the 6th ACM/USENIX Symposium on Operating System Design and Implementation (OSDI)
-
-
Singh, S.1
Estan, C.2
Varghese, G.3
Savage, S.4
-
9
-
-
34047129159
-
Using entropy analysis to find encrypted and packed malware
-
R. Lyda and J. Hamrock, "Using entropy analysis to find encrypted and packed malware," IEEE Security and Privacy, vol. 5, no. 2, pp. 40-45, 2007.
-
(2007)
IEEE Security and Privacy
, vol.5
, Issue.2
, pp. 40-45
-
-
Lyda, R.1
Hamrock, J.2
-
10
-
-
85084160818
-
Static disassembly of obfuscated binaries
-
C. Kruegel, W. K. Robertson, F. Valeur, and G. Vigna, "Static disassembly of obfuscated binaries," in Proceedings of the 13th USENIX Security Symposium, 2004.
-
(2004)
Proceedings of the 13th USENIX Security Symposium
-
-
Kruegel, C.1
Robertson, W.K.2
Valeur, F.3
Vigna, G.4
-
11
-
-
33746389292
-
Polymorphic worm detection using structural information of executables
-
C. Kruegel, E. Kirda, D. Mutz, W. Robertson, and G. Vigna, "Polymorphic worm detection using structural information of executables," in Proceedings of the 8th International Symposium on Recent Advances in Intrusion Detection (RAID), 2005.
-
(2005)
Proceedings of the 8th International Symposium on Recent Advances in Intrusion Detection (RAID)
-
-
Kruegel, C.1
Kirda, E.2
Mutz, D.3
Robertson, W.4
Vigna, G.5
-
13
-
-
85077703150
-
Polymorphic blending attacks
-
P. Fogla, M. Sharif, R. Perdisci, O. Kolesnikov, and W. Lee, "Polymorphic blending attacks," in Proceedings of the 15th USENIX Security Symposium, 2006.
-
(2006)
Proceedings of the 15th USENIX Security Symposium
-
-
Fogla, P.1
Sharif, M.2
Perdisci, R.3
Kolesnikov, O.4
Lee, W.5
-
14
-
-
48649087530
-
Limits of static analysis for malware detection
-
A. Moser, C. Kruegel, and E. Kirda, "Limits of static analysis for malware detection," in Proceedings of the 23rd Annual Computer Security Applications Conference (ACSAC), 2007, pp. 421-430.
-
(2007)
Proceedings of the 23rd Annual Computer Security Applications Conference (ACSAC)
, pp. 421-430
-
-
Moser, A.1
Kruegel, C.2
Kirda, E.3
-
15
-
-
33644565261
-
Polymorphic shellcode engine using spectrum analysis
-
T. Detristan, T. Ulenspiegel, Y. Malcom, and M. Underduk, "Polymorphic shellcode engine using spectrum analysis," Phrack Issue 0x3d, 2003.
-
(2003)
Phrack Issue 0x3d
-
-
Detristan, T.1
Ulenspiegel, T.2
Malcom, Y.3
Underduk, M.4
-
20
-
-
33745788387
-
On deriving unknown vulnerabilities from zero-day polymorphic and metamorphic worm exploits
-
J. R. Crandall, Z. Su, S. F. Wu, and F. T. Chong, "On deriving unknown vulnerabilities from zero-day polymorphic and metamorphic worm exploits," in Proceedings of the 12th ACM Conference on Computer and Communications Security (CCS), 2005, pp. 235-248.
-
(2005)
Proceedings of the 12th ACM Conference on Computer and Communications Security (CCS)
, pp. 235-248
-
-
Crandall, J.R.1
Su, Z.2
Wu, S.F.3
Chong, F.T.4
-
21
-
-
25844462447
-
Defending against internet worms: A signature-based approach
-
Y. Tang and S. Chen, "Defending against internet worms: a signature-based approach," in Proceedings of the 24th INFOCOM, 2005.
-
(2005)
Proceedings of the 24th INFOCOM
-
-
Tang, Y.1
Chen, S.2
-
23
-
-
60349101742
-
Using an ensemble of one-class svm classifiers to harden payload-based anomaly detection systems
-
R. Perdisci, G. Gu, and W. Lee, "Using an ensemble of one-class svm classifiers to harden payload-based anomaly detection systems," in Proceedings of the Sixth International Conference on Data Mining, 2006, pp. 488-498.
-
(2006)
In Proceedings of the Sixth International Conference on Data Mining
, pp. 488-498
-
-
Perdisci, R.1
Gu, G.2
Lee, W.3
-
24
-
-
33751051489
-
Misleading worm signature generators using deliberate noise injection
-
R. Perdisci, D. Dagon, W. Lee, P. Fogla, and M. Sharif, "Misleading worm signature generators using deliberate noise injection," in Proceedings of the 2006 IEEE Symposium on Security and Privacy (S&P), 2006.
-
(2006)
Proceedings of the 2006 IEEE Symposium on Security and Privacy (S&P)
-
-
Perdisci, R.1
Dagon, D.2
Lee, W.3
Fogla, P.4
Sharif, M.5
-
26
-
-
85084160549
-
Catch me, if you can: Evading network signatures with web-based polymorphic worms
-
M. V. Gundy, D. Balzarotti, and G. Vigna, "Catch me, if you can: Evading network signatures with web-based polymorphic worms," in Proceedings of 1st USENIX Workshop on Offensive Technologies, 2007.
-
(2007)
Proceedings of 1st USENIX Workshop on Offensive Technologies
-
-
Gundy, M.V.1
Balzarotti, D.2
Vigna, G.3
-
28
-
-
27544433210
-
Semantics-aware malware detection
-
M. Christodorescu, S. Jha, S. A. Seshia, D. Song, and R. E. Bryant, "Semantics-aware malware detection," in Proceedings of the 2005 IEEE Symposium on Security and Privacy (S&P), 2005.
-
(2005)
Proceedings of the 2005 IEEE Symposium on Security and Privacy (S&P)
-
-
Christodorescu, M.1
Jha, S.2
Seshia, S.A.3
Song, D.4
Bryant, R.E.5
-
29
-
-
26444526878
-
Detecting malicious code by model checking
-
J. Kinder, S. Katzenbeisser, C. Schallhart, and H. Veith, "Detecting malicious code by model checking," in Proceedings of the 2nd International Conference Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA), 2005, pp. 174-187.
-
(2005)
Proceedings of the 2nd International Conference Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA)
, pp. 174-187
-
-
Kinder, J.1
Katzenbeisser, S.2
Schallhart, C.3
Veith, H.4
-
30
-
-
84923445084
-
An architecture for generating semantics-aware signatures
-
V. Yegneswaran, J. T. Giffin, P. Barford, and S. Jha, "An architecture for generating semantics-aware signatures," in Proceedings of the 14th USENIX Security Symposium, 2005.
-
(2005)
Proceedings of the 14th USENIX Security Symposium
-
-
Yegneswaran, V.1
Giffin, J.T.2
Barford, P.3
Jha, S.4
-
31
-
-
79251578513
-
On the (im)possibility of obfuscating programs
-
B. Barak, O. Goldreich, R. Impagliazzo, S. Rudich, A. Sahai, S. P. Vadhan, and K. Yang, "On the (im)possibility of obfuscating programs," in Proceedings of the 21st Annual International Cryptology Conference (CRYPTO), 2001.
-
(2001)
Proceedings of the 21st Annual International Cryptology Conference (CRYPTO)
-
-
Barak, B.1
Goldreich, O.2
Impagliazzo, R.3
Rudich, S.4
Sahai, A.5
Vadhan, S.P.6
Yang, K.7
-
35
-
-
85077528077
-
Automating mimicry attacks using static binary analysis
-
C. Kruegel, E. Kirda, D. Mutz, W. Robertson, and G. Vigna, "Automating mimicry attacks using static binary analysis," in Proceedings of the 14th USENIX Security Symposium, 2005.
-
(2005)
Proceedings of the 14th USENIX Security Symposium
-
-
Kruegel, C.1
Kirda, E.2
Mutz, D.3
Robertson, W.4
Vigna, G.5
-
36
-
-
60749118885
-
A practical mimicry attack against powerful system-call monitors
-
C. Parampalli, R. Sekar, and R. Johnson, "A practical mimicry attack against powerful system-call monitors," in Proceedings of the 2007 ACM Symposium on Information, Computer and Communications Security (ASIACCS), 2007.
-
(2007)
Proceedings of the 2007 ACM Symposium on Information, Computer and Communications Security (ASIACCS)
-
-
Parampalli, C.1
Sekar, R.2
Johnson, R.3
-
37
-
-
84950895792
-
Mimic functions
-
P. Wayner, "Mimic functions," Cryptologia, vol. 16, no. 3, pp. 193-214, 1992.
-
(1992)
Cryptologia
, vol.16
, Issue.3
, pp. 193-214
-
-
Wayner, P.1
-
38
-
-
0031599142
-
Mersenne twister: A 623-dimensionally equidistributed uniform pseudo-random number generator
-
M. Matsumoto and T. Nishimura, "Mersenne twister: a 623-dimensionally equidistributed uniform pseudo-random number generator," ACM Transactions on Modeling and Computer Simulation (TOMACS), vol. 8, no. 1, pp. 3-30, 1998.
-
(1998)
ACM Transactions on Modeling and Computer Simulation (TOMACS)
, vol.8
, Issue.1
, pp. 3-30
-
-
Matsumoto, M.1
Nishimura, T.2
-
39
-
-
41949123903
-
Hindering reverse engineering: Thinking outside the box
-
T. E. Dube, B. D. Birrer, R. A. Raines, R. O. Baldwin, B. E. Mullins, R. W. Bennington, and C. E. Reuter, "Hindering reverse engineering: Thinking outside the box," IEEE Security and Privac, vol. 6, no. 2, pp. 58-65, 2008.
-
(2008)
IEEE Security and Privac
, vol.6
, Issue.2
, pp. 58-65
-
-
Dube, T.E.1
Birrer, B.D.2
Raines, R.A.3
Baldwin, R.O.4
Mullins, B.E.5
Bennington, R.W.6
Reuter, C.E.7
|