-
1
-
-
34547141391
-
The nepenthes platform: An efficient approach to collect malware
-
September
-
P. Baecher, M. Koetter, T. Holz, M. Dornseif, and F. Freiling. The Nepenthes Platform: An Efficient Approach to Collect Malware. In 9th International Symposium on Recent Advances in Intrusion Detection (RAID), September 2006.
-
(2006)
9th International Symposium on Recent Advances in Intrusion Detection (RAID)
-
-
Baecher, P.1
Koetter, M.2
Holz, T.3
Dornseif, M.4
Freiling, F.5
-
4
-
-
79958723522
-
An analysis of rogue av campaigns
-
September
-
M. Cova, C. Leita, O. Thonnard, A. Keromytis, and M. Dacier. An analysis of rogue av campaigns. In Proc. of the 13th International Symposium on Intrusion Detection (RAID 2010), September 2010.
-
(2010)
Proc. of the 13th International Symposium on Intrusion Detection (RAID 2010)
-
-
Cova, M.1
Leita, C.2
Thonnard, O.3
Keromytis, A.4
Dacier, M.5
-
9
-
-
85076893377
-
Spyproxy: Execution-based detection of malicious web content
-
A. Moshchuk, T. Bragin, D. Deville, S. D. Gribble, and H. M. Levy. Spyproxy: Execution-based detection of malicious web content. In Proceeding of the 16th USENIX Security Symposium, 2007.
-
(2007)
Proceeding of the 16th USENIX Security Symposium
-
-
Moshchuk, A.1
Bragin, T.2
Deville, D.3
Gribble, S.D.4
Levy, H.M.5
-
10
-
-
85084094793
-
Phoneyc: A virtual client honeypot
-
USENIX Association
-
J. Nazario. Phoneyc: A virtual client honeypot. In Proceedings of the 2nd USENIX conference on Large-scale exploits and emergent threats: botnets, spyware, worms, and more, page 6. USENIX Association, 2009.
-
(2009)
Proceedings of the 2nd USENIX Conference on Large-scale Exploits and Emergent Threats: Botnets, Spyware, Worms, and More
, pp. 6
-
-
Nazario, J.1
-
12
-
-
79951858053
-
The quest for multi-headed worms
-
July 10-11th, Paris, France, Jul 2008
-
V.-H. Pham, M. Dacier, G. Urvoy Keller, and T. En Najjary. The quest for multi-headed worms. In DIMVA 2008, 5th Conference on Detection of Intrusions and Malware & Vulnerability Assessment, July 10-11th, 2008, Paris, France, Jul 2008.
-
(2008)
DIMVA 2008, 5th Conference on Detection of Intrusions and Malware & Vulnerability Assessment
-
-
Pham, V.-H.1
Dacier, M.2
Keller, G.U.3
Najjary, T.E.4
-
14
-
-
77954582125
-
-
N. Provos. Spybye, http://www.monkey.org/~provos/spybye.
-
Spybye
-
-
Provos, N.1
-
16
-
-
85080711655
-
The ghost in the browser. Analysis of web-based malware
-
Google, Inc
-
N. Provos, D. McNamee, P. Mavrommatis, K. Wang, and N. Modadugu. The ghost in the browser. analysis of web-based malware. In First Workshop on Hot Topics in Understanding Botnets (HotBots 07). Google, Inc, 2007.
-
(2007)
First Workshop on Hot Topics in Understanding Botnets (HotBots 07)
-
-
Provos, N.1
McNamee, D.2
Mavrommatis, P.3
Wang, K.4
Modadugu, N.5
-
17
-
-
84880116758
-
HoneyC- The low-interaction client honeypot
-
Hamilton, 2006
-
C. Seifert, I. Welch, and P. Komisarczuk. HoneyC-The Low-Interaction Client Honeypot. NZCSRCS, Hamilton, 2007, http://www.mcs.vuw.ac.nz/cseifert/ blog/images/seiferrt-honeyc.pdf 2006.
-
(2007)
NZCSRCS
-
-
Seifert, C.1
Welch, I.2
Komisarczuk, P.3
-
18
-
-
74049154670
-
Your botnet is my botnet: Analysis of a botnet takeover
-
B. Stone-Gross, M. Cova, L. Cavallaro, B. Gilbert, M. Szydlowski, R. Kemmerer, C. Kruegel, and G. Vigna. Your Botnet is My Botnet: Analysis of a Botnet Takeover. In Proc. of the ACM Conference on Computer and Communications Security, 2009.
-
(2009)
Proc. of the ACM Conference on Computer and Communications Security
-
-
Stone-Gross, B.1
Cova, M.2
Cavallaro, L.3
Gilbert, B.4
Szydlowski, M.5
Kemmerer, R.6
Kruegel, C.7
Vigna, G.8
-
19
-
-
77950794331
-
FIRE: FInding Rogue nEtworks
-
December
-
B. Stone-Gross, A. Moser, C. Kruegel, K. Almaroth, and E. Kirda. FIRE: FInding Rogue nEtworks. In 25th Annual Computer Security Applications Conference (ACSAC), December 2009.
-
(2009)
25th Annual Computer Security Applications Conference (ACSAC)
-
-
Stone-Gross, B.1
Moser, A.2
Kruegel, C.3
Almaroth, K.4
Kirda, E.5
-
20
-
-
79958757592
-
-
Symantec. The trojan.hydraq incident, http://www.symantec.com/connect/ blogs/trojanhydraq-incident.
-
The Trojan.hydraq Incident
-
-
-
21
-
-
79958700805
-
-
The Honeynet Project. Home page of Capture-HPC, https://projects. honeynet.org/capture-hpc.
-
Home Page of Capture-HPC
-
-
-
24
-
-
79958698206
-
-
The WOMBAT FP7 project. Second WOMBAT workshop proceedings, http://wombat-project.eu/2010/02/wombat-deliverable-d10d63-seco.html.
-
Second WOMBAT Workshop Proceedings
-
-
-
25
-
-
79958699712
-
-
VU Amsterdam. Shelia, http://www.cs.vu.nl/~herbertb/misc/shelia/.
-
Shelia
-
-
-
26
-
-
84904088330
-
Automated web patrol with strider honeymonkeys
-
Y. Wang, D. Beck, X. Jiang, R. Roussev, C. Verbowski, S. Chen, and S. King. Automated web patrol with strider honeymonkeys. In Proceedings of the 2006 Network and Distributed System Security Symposium, pages 35-49, 2006.
-
(2006)
Proceedings of the 2006 Network and Distributed System Security Symposium
, pp. 35-49
-
-
Wang, Y.1
Beck, D.2
Jiang, X.3
Roussev, R.4
Verbowski, C.5
Chen, S.6
King, S.7
|