-
1
-
-
78650035986
-
-
Anubis. http://anubis.seclab.tuwien.ac.at. 2008.
-
(2008)
-
-
-
2
-
-
38149089416
-
Automated classification and analysis of internet malware
-
C. Kruegel, R. Lippmann, and A. Clark, editors, Proceedings of the 10th International Symposium on Recent Advances in Intrusion Detection (RAID'07), Gold Goast, Australia, Sept. Springer-Verlag
-
M. Bailey, J. Oberheide, J. Andersen, Z. M. Mao, F. Jahanian, and J. Nazario. Automated classification and analysis of internet malware. In C. Kruegel, R. Lippmann, and A. Clark, editors, Proceedings of the 10th International Symposium on Recent Advances in Intrusion Detection (RAID'07), volume 4637 of Lecture Notes in Computer Science, pages 178-197, Gold Goast, Australia, Sept. 2007. Springer-Verlag.
-
(2007)
Lecture Notes in Computer Science
, vol.4637
, pp. 178-197
-
-
Bailey, M.1
Oberheide, J.2
Andersen, J.3
Mao, Z.M.4
Jahanian, F.5
Nazario, J.6
-
3
-
-
85043201839
-
Scalable, behavior-based malware clustering
-
San Diego, CA, USA, Feb.
-
U. Bayer, P. M. Comparetti, C. Hlauschek, C. Kruegel, and E. Kirda. Scalable, behavior-based malware clustering. In Proceedings of the 16th Annual Network and Distributed System Security Symposium (NDSS'09), San Diego, CA, USA, Feb. 2009.
-
(2009)
Proceedings of the 16th Annual Network and Distributed System Security Symposium (NDSS'09)
-
-
Bayer, U.1
Comparetti, P.M.2
Hlauschek, C.3
Kruegel, C.4
Kirda, E.5
-
4
-
-
33746406796
-
Detecting self-mutating malware using control-flow graph matching
-
R. Büschkes and P. Laskov, editors, Proceedings of the 3rd Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA'06). Springer-Verlag
-
D. Bruschi, L. Martignoni, and M. Monga. Detecting self-mutating malware using control-flow graph matching. In R. Büschkes and P. Laskov, editors, Proceedings of the 3rd Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA'06), volume 4064 of Lecture Notes in Computer Science, pages 129-143. Springer-Verlag, 2006.
-
(2006)
Lecture Notes in Computer Science
, vol.4064
, pp. 129-143
-
-
Bruschi, D.1
Martignoni, L.2
Monga, M.3
-
5
-
-
27544433210
-
Semantics-aware malware detection
-
Oakland, CA, USA, May 8-11. IEEE Computer Society
-
M. Christodorescu, S. Jha, S. A. Seshia, D. Song, and R. E. Bryant. Semantics-aware malware detection. In Proceedings of the 2005 IEEE Symposium on Security and Privacy (S&P'05), pages 32-46, Oakland, CA, USA, May 8-11, 2005. IEEE Computer Society.
-
(2005)
Proceedings of the 2005 IEEE Symposium on Security and Privacy (S&P'05)
, pp. 32-46
-
-
Christodorescu, M.1
Jha, S.2
Seshia, S.A.3
Song, D.4
Bryant, R.E.5
-
6
-
-
37849017546
-
Mining specifications of malicious behavior
-
New York, NY, USA. ACM Press
-
M. Christodorescu, C. Kruegel, and S. Jha. Mining specifications of malicious behavior. In Proceedings of the 6th Joint Meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering (ESEC/FSE'07), pages 5-14, New York, NY, USA, 2007. ACM Press.
-
(2007)
Proceedings of the 6th Joint Meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering (ESEC/FSE'07)
, pp. 5-14
-
-
Christodorescu, M.1
Kruegel, C.2
Jha, S.3
-
7
-
-
48349100150
-
Dynamic monitoring of malicious activity in software systems
-
Indianapolis, IN, USA, Mar.
-
M. Debbabi, M. Girard, L. Poulin, M. Salois, and N. Tawbi. Dynamic monitoring of malicious activity in software systems. In Proceedings of the Symposium on Requirements Engineering for Information Security(SREIS'01), pages 1-10, Indianapolis, IN, USA, Mar. 2001.
-
(2001)
Proceedings of the Symposium on Requirements Engineering for Information Security(SREIS'01)
, pp. 1-10
-
-
Debbabi, M.1
Girard, M.2
Poulin, L.3
Salois, M.4
Tawbi, N.5
-
8
-
-
60649099375
-
Pinup: Pinning user files to known applications
-
Anaheim, CA, USA, Dec. IEEE Computer Society
-
W. Enck, P. D. McDaniel, and T. Jaeger. Pinup: Pinning user files to known applications. In Proceedings of the 24th Annual Computer Security Applications Conference (ACSAC'08), pages 55-64, Anaheim, CA, USA, Dec. 2008. IEEE Computer Society.
-
(2008)
Proceedings of the 24th Annual Computer Security Applications Conference (ACSAC'08)
, pp. 55-64
-
-
Enck, W.1
McDaniel, P.D.2
Jaeger, T.3
-
9
-
-
0029716418
-
A sense of self for unix processes
-
IEEE Computer Society Press
-
S. Forrest, S. A. Hofmeyr, A. Somayaji, and T. A. Longstaff. A sense of self for unix processes. In Proceedings of the 1996 IEEE Symposium on Security and Privacy (S&P'96), pages 120-128. IEEE Computer Society Press, 1996.
-
(1996)
Proceedings of the 1996 IEEE Symposium on Security and Privacy (S&P'96)
, pp. 120-128
-
-
Forrest, S.1
Hofmeyr, S.A.2
Somayaji, A.3
Longstaff, T.A.4
-
14
-
-
85077680022
-
Behavior-based spyware detection
-
Vancouver, BC, Canada, August
-
E. Kirda, C. Kruegel, G. Banks, G. Vigna, and R. Kemmerer. Behavior-based spyware detection. In Proceedings of the 15th USENIX Security Symposium (Security'06), Vancouver, BC, Canada, August 2006.
-
(2006)
Proceedings of the 15th USENIX Security Symposium (Security'06)
-
-
Kirda, E.1
Kruegel, C.2
Banks, G.3
Vigna, G.4
Kemmerer, R.5
-
15
-
-
85076206522
-
Effective and efficient malware detection at the end host
-
Montréal, Canada, Aug. USENIX Association
-
C. Kolbitsch, P. Milani, C. Kruegel, E. Kirda, X. Zhou, and X. Wang. Effective and efficient malware detection at the end host. In Proceedings of the 18th USENIX Security Symposium (Security'09), pages 351-366, Montréal, Canada, Aug. 2009. USENIX Association.
-
(2009)
Proceedings of the 18th USENIX Security Symposium (Security'09)
, pp. 351-366
-
-
Kolbitsch, C.1
Milani, P.2
Kruegel, C.3
Kirda, E.4
Zhou, X.5
Wang, X.6
-
16
-
-
85077528077
-
Automating mimicry attacks using static binary analysis
-
Baltimore, MD, USA, August
-
C. Kruegel, E. Kirda, D. Mutz, W. Robertson, and G. Vigna. Automating mimicry attacks using static binary analysis. In Proceedings of the 14th USENIX Security Symposium (Security'05), Baltimore, MD, USA, August 2005.
-
(2005)
Proceedings of the 14th USENIX Security Symposium (Security'05)
-
-
Kruegel, C.1
Kirda, E.2
Mutz, D.3
Robertson, W.4
Vigna, G.5
-
17
-
-
33745670395
-
Polymorphic worm detection using structural information of executables
-
Proceedings of the 8th International Symposium on Recent Advances in Intrusion Detection (RAID'05), Seattle, WA, September. Springer-Verlag
-
C. Kruegel, E. Kirda, D. Mutz, W. Robertson, and G. Vigna. Polymorphic Worm Detection Using Structural Information of Executables. In Proceedings of the 8th International Symposium on Recent Advances in Intrusion Detection (RAID'05), volume 3858 of LNCS, pages 207-226, Seattle, WA, September 2005. Springer-Verlag.
-
(2005)
LNCS
, vol.3858
, pp. 207-226
-
-
Kruegel, C.1
Kirda, E.2
Mutz, D.3
Robertson, W.4
Vigna, G.5
-
19
-
-
33745456200
-
Fileprints: Identifying file types by n-gram analysis
-
West Point, NY, June. United States Military Academy
-
W.-J. Li, K. Wang, S. J. Stolfo, and B. Herzog. Fileprints: Identifying file types by n-gram analysis. In Proceedings of the 6th Annual IEEE Systems, Man, and Cybernetics (SMC) Workshop on Information Assurance, pages 64-71, West Point, NY, June 2005. United States Military Academy.
-
(2005)
Proceedings of the 6th Annual IEEE Systems, Man, and Cybernetics (SMC) Workshop on Information Assurance
, pp. 64-71
-
-
Li, W.-J.1
Wang, K.2
Stolfo, S.J.3
Herzog, B.4
-
20
-
-
2442425355
-
Integrating flexible support for security policies into the linux operating system
-
Berkeley, CA, USA. USENIX Association
-
P. Loscocco and S. Smalley. Integrating flexible support for security policies into the linux operating system. In Proceedings of the FREENIX Track of the 2001 USENIX Annual Technical Conference, pages 29-42, Berkeley, CA, USA, 2001. USENIX Association.
-
(2001)
Proceedings of the FREENIX Track of the 2001 USENIX Annual Technical Conference
, pp. 29-42
-
-
Loscocco, P.1
Smalley, S.2
-
21
-
-
56549121841
-
A layered architecture for detecting malicious behaviors
-
Berlin, Heidelberg. Springer-Verlag
-
L. Martignoni, E. Stinson, M. Fredrikson, S. Jha, and J. C. Mitchell. A layered architecture for detecting malicious behaviors. In Proceedings of the 11th international Symposium on Recent Advances in Intrusion Detection (RAID'08), pages 78-97, Berlin, Heidelberg, 2008. Springer-Verlag.
-
(2008)
Proceedings of the 11th International Symposium on Recent Advances in Intrusion Detection (RAID'08)
, pp. 78-97
-
-
Martignoni, L.1
Stinson, E.2
Fredrikson, M.3
Jha, S.4
Mitchell, J.C.5
-
22
-
-
21644475665
-
Static analyzer for vicious executables (SAVE)
-
Tucson, AZ, USA, Dec.
-
S. Mukkamala, A. Sung, D. Xu, and P. Chavez. Static analyzer for vicious executables (SAVE). In Proceedings of the 20th Annual Computer Security Applications Conference (ACSAC'04), pages 326-334, Tucson, AZ, USA, Dec. 2004.
-
(2004)
Proceedings of the 20th Annual Computer Security Applications Conference (ACSAC'04)
, pp. 326-334
-
-
Mukkamala, S.1
Sung, A.2
Xu, D.3
Chavez, P.4
-
23
-
-
49949090311
-
Learning and classification of malware behavior
-
D. Zamboni, editor, Proceedings of the 5th Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA'08). Springer-Verlag
-
K. Rieck, T. Holz, C. Willems, P. Düssel1, and P. Laskov. Learning and classification of malware behavior. In D. Zamboni, editor, Proceedings of the 5th Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA'08), volume 5137 of Lecture Notes in Computer Science, pages 108-125. Springer-Verlag, 2008.
-
(2008)
Lecture Notes in Computer Science
, vol.5137
, pp. 108-125
-
-
Rieck, K.1
Holz, T.2
Willems, C.3
Düssell, P.4
Laskov, P.5
-
25
-
-
0034838197
-
Data mining methods for detection of new malicious executables
-
May
-
M. G. Schultz, E. Eskin, E. Zadok, and S. J. Stolfo. Data mining methods for detection of new malicious executables. In Proceedings of the 2001 IEEE Symposium on Security and Privacy (S&P'01), pages 38-49, May 2001.
-
(2001)
Proceedings of the 2001 IEEE Symposium on Security and Privacy (S&P'01)
, pp. 38-49
-
-
Schultz, M.G.1
Eskin, E.2
Zadok, E.3
Stolfo, S.J.4
-
26
-
-
37849037807
-
Characterizing bots remote control behavior
-
C. Kruegel, R. Lippmann and A. Clark, editors, Proceedings of the 10th International Symposium on Recent Advances in Intrusion Detection (RAID'07). Springer-Verlag
-
E. Stinson and J. C. Mitchell. Characterizing bots remote control behavior. In C. Kruegel, R. Lippmann and A. Clark, editors, Proceedings of the 10th International Symposium on Recent Advances in Intrusion Detection (RAID'07), volume 4637 of Lecture Notes in Computer Science. Springer-Verlag, 2007.
-
(2007)
Lecture Notes in Computer Science
, vol.4637
-
-
Stinson, E.1
Mitchell, J.C.2
-
28
-
-
0038011184
-
Mimicry attacks on host-based intrusion detection systems
-
New York, NY, USA. ACM
-
D. Wagner and P. Soto. Mimicry attacks on host-based intrusion detection systems. In Proceedings of the 9th ACM conference on Computer and Communications Security (CCS'02), pages 255-264, New York, NY, USA, 2002. ACM.
-
(2002)
Proceedings of the 9th ACM Conference on Computer and Communications Security (CCS'02)
, pp. 255-264
-
-
Wagner, D.1
Soto, P.2
-
29
-
-
28344446955
-
Polymorphic malicious executable scanner by API sequence analysis
-
Kitakyushu, Japan, Dec. IEEE Computer Society
-
J. Xu, A. H. Sung, P. Chavez, and S. Mukkamala. Polymorphic malicious executable scanner by API sequence analysis. In Proceedings of the 4th International Conference on Hybrid Intelligent Systems (HIS'04), pages 378-383, Kitakyushu, Japan, Dec. 2004. IEEE Computer Society.
-
(2004)
Proceedings of the 4th International Conference on Hybrid Intelligent Systems (HIS'04)
, pp. 378-383
-
-
Xu, J.1
Sung, A.H.2
Chavez, P.3
Mukkamala, S.4
-
30
-
-
77950788046
-
Panorama: Capturing system-wide information flow for malware detection and analysis
-
New York, NY, USA. ACM
-
H. Yin, D. Song, M. Egele, C. Kruegel, and E. Kirda. Panorama: capturing system-wide information flow for malware detection and analysis. In Proceedings of the 14th ACM conference on Computer and Communications Security (CCS'07), pages 116-127, New York, NY, USA, 2007. ACM.
-
(2007)
Proceedings of the 14th ACM Conference on Computer and Communications Security (CCS'07)
, pp. 116-127
-
-
Yin, H.1
Song, D.2
Egele, M.3
Kruegel, C.4
Kirda, E.5
|