-
1
-
-
78650160624
-
-
DynamoRIO, http://dynamorio.org
-
-
-
-
2
-
-
78650130671
-
-
OpenFST, http://www.openfst.org/
-
-
-
-
3
-
-
78650083692
-
-
Pin, http://www.pintool.org
-
-
-
-
4
-
-
77951289154
-
Measuring similarity of malware behavior
-
IEEE, Los Alamitos October
-
Apel, M., Bockermann, C., Meier, M.: Measuring similarity of malware behavior. In: IEEE Conference on Local Computer Networks, pp. 891-898. IEEE, Los Alamitos (October 2009)
-
(2009)
IEEE Conference on Local Computer Networks
, pp. 891-898
-
-
Apel, M.1
Bockermann, C.2
Meier, M.3
-
6
-
-
34247166239
-
Static detection of malicious code in executable programs
-
Bergeron, J., Debbabi, M., Desharnais, J., Erhioui, M.M., Lavoie, Y., Tawbi, N.: Static detection of malicious code in executable programs. In: Symposium on Requirements Engineering for Information Security (2001)
-
Symposium on Requirements Engineering for Information Security (2001)
-
-
Bergeron, J.1
Debbabi, M.2
Desharnais, J.3
Erhioui, M.M.4
Lavoie, Y.5
Tawbi, N.6
-
8
-
-
84882738195
-
Automatically identifying trigger-based behavior in malware
-
Brumley, D., Hartwig, C., Liang, Z., Newsome, J., Song, D., Yin, H.: Automatically identifying trigger-based behavior in malware. Botnet Detection 36, 65-88 (2008)
-
(2008)
Botnet Detection
, vol.36
, pp. 65-88
-
-
Brumley, D.1
Hartwig, C.2
Liang, Z.3
Newsome, J.4
Song, D.5
Yin, H.6
-
9
-
-
33746406796
-
Detecting self-mutating malware using control-flow graph matching
-
Büschkes, R., Laskov, P. (eds.) DIMVA 2006. Springer, Heidelberg
-
Bruschi, D., Martignoni, L., Monga, M.: Detecting self-mutating malware using control-flow graph matching. In: Büschkes, R., Laskov, P. (eds.) DIMVA 2006. LNCS, vol. 4064, pp. 129-143. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4064
, pp. 129-143
-
-
Bruschi, D.1
Martignoni, L.2
Monga, M.3
-
10
-
-
27544433210
-
Semantics-aware malware detection
-
IEEE Computer Society, Los Alamitos
-
Christodorescu, M., Jha, S., Seshia, S.A., Song, D., Bryant, R.E.: Semantics-aware malware detection. In: IEEE Symposium on Security and Privacy, pp. 32-46. IEEE Computer Society, Los Alamitos (2005)
-
(2005)
IEEE Symposium on Security and Privacy
, pp. 32-46
-
-
Christodorescu, M.1
Jha, S.2
Seshia, S.A.3
Song, D.4
Bryant, R.E.5
-
11
-
-
0023294949
-
Computer viruses: Theory and experiments
-
Cohen, F.: Computer viruses: Theory and experiments. Computers and Security 6(1), 22-35 (1987)
-
(1987)
Computers and Security
, vol.6
, Issue.1
, pp. 22-35
-
-
Cohen, F.1
-
13
-
-
0042542175
-
A uniform framework for problems on context-free grammars
-
Esparza, J., Rossmanith, P., Schwoon, S.: A uniform framework for problems on context-free grammars. Bulletin of the EATCS 72, 169-177 (2000)
-
(2000)
Bulletin of the EATCS
, vol.72
, pp. 169-177
-
-
Esparza, J.1
Rossmanith, P.2
Schwoon, S.3
-
16
-
-
76649135461
-
Malware behavioral detection by attributeautomata using abstraction from platform and language
-
Balzarotti, D. (ed.) RAID 2009. Springer, Heidelberg
-
Jacob, G., Debar, H., Filiol, E.: Malware behavioral detection by attributeautomata using abstraction from platform and language. In: Balzarotti, D. (ed.) RAID 2009. LNCS, vol. 5758, pp. 81-100. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5758
, pp. 81-100
-
-
Jacob, G.1
Debar, H.2
Filiol, E.3
-
17
-
-
26444526878
-
Detecting malicious code by model checking
-
Julisch, K., Krügel, C. (eds.) DIMVA 2005. Springer, Heidelberg
-
Kinder, J., Katzenbeisser, S., Schallhart, C., Veith, H.: Detecting malicious code by model checking. In: Julisch, K., Krügel, C. (eds.) DIMVA 2005. LNCS, vol. 3548, pp. 174-187. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3548
, pp. 174-187
-
-
Kinder, J.1
Katzenbeisser, S.2
Schallhart, C.3
Veith, H.4
-
18
-
-
48349119837
-
Dynamic detection and classification of computer viruses using general behaviour patterns
-
Le Charlier, B., Mounji, A., Swimmer, M.: Dynamic detection and classification of computer viruses using general behaviour patterns. In: International Virus Bulletin Conference, pp. 1-22 (1995)
-
(1995)
International Virus Bulletin Conference
, pp. 1-22
-
-
Le Charlier, B.1
Mounji, A.2
Swimmer, M.3
-
19
-
-
56549121841
-
A layered architecture for detecting malicious behaviors
-
Lippmann, R., Kirda, E., Trachtenberg, A. (eds.) RAID 2008. Springer, Heidelberg
-
Martignoni, L., Stinson, E., Fredrikson, M., Jha, S., Mitchell, J.C.: A layered architecture for detecting malicious behaviors. In: Lippmann, R., Kirda, E., Trachtenberg, A. (eds.) RAID 2008. LNCS, vol. 5230, pp. 78-97. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5230
, pp. 78-97
-
-
Martignoni, L.1
Stinson, E.2
Fredrikson, M.3
Jha, S.4
Mitchell, J.C.5
-
20
-
-
34548737161
-
Exploring multiple execution paths for malware analysis
-
IEEE Computer Society, Los Alamitos
-
Moser, A., Kruegel, C., Kirda, E.: Exploring multiple execution paths for malware analysis. In: IEEE Symposium on Security and Privacy, pp. 231-245. IEEE Computer Society, Los Alamitos (2007)
-
(2007)
IEEE Symposium on Security and Privacy
, pp. 231-245
-
-
Moser, A.1
Kruegel, C.2
Kirda, E.3
-
21
-
-
0034829697
-
A fast automaton-based method for detecting anomalous program behaviors
-
IEEE Computer Society, Los Alamitos
-
Sekar, R., Bendre, M., Dhurjati, D., Bollineni, P.: A fast automaton-based method for detecting anomalous program behaviors. In: IEEE Symposium on Security and Privacy, pp. 144-155. IEEE Computer Society, Los Alamitos (2001)
-
(2001)
IEEE Symposium on Security and Privacy
, pp. 144-155
-
-
Sekar, R.1
Bendre, M.2
Dhurjati, D.3
Bollineni, P.4
-
22
-
-
84946414079
-
Static verification of worm and virus behavior in binary executables using model checking
-
IEEE Press, Los Alamitos
-
Singh, P.K., Lakhotia, A.: Static verification of worm and virus behavior in binary executables using model checking. In: Information Assurance Workshop, pp. 298-300. IEEE Press, Los Alamitos (2003)
-
(2003)
Information Assurance Workshop
, pp. 298-300
-
-
Singh, P.K.1
Lakhotia, A.2
|