-
2
-
-
77956577255
-
TTAnalyze: A Tool for Analyzing Malware
-
Bayer, U., Kruegel, C., Kirda, E.: TTAnalyze: A Tool for Analyzing Malware. In: Proceedings of the European Institute for Computer Antivirus Research Annual Conference, EICAR (2006)
-
Proceedings of the European Institute for Computer Antivirus Research Annual Conference, EICAR (2006)
-
-
Bayer, U.1
Kruegel, C.2
Kirda, E.3
-
5
-
-
77954566293
-
Detection and Analysis of Drive-by-Download Attacks and Malicious JavaScript Code
-
Cova, M., Kruegel, C., Vigna, G.: Detection and Analysis of Drive-by-Download Attacks and Malicious JavaScript Code. In: Proceedings of the International World Wide Web Conference, WWW(2010)
-
Proceedings of the International World Wide Web Conference, WWW(2010)
-
-
Cova, M.1
Kruegel, C.2
Vigna, G.3
-
7
-
-
79960020375
-
-
CWSandbox (2009), http://www.cwsandbox.org/
-
(2009)
-
-
-
8
-
-
70349240080
-
Ether:Malware analysis via hardware virtualization extensions
-
Dinaburg, A., Royal, P., Sharif, M., Lee,W.: Ether:Malware analysis via hardware virtualization extensions. In: Proceedings of the ACM Conference on Computer and Communications Security, CCS (2008)
-
Proceedings of the ACM Conference on Computer and Communications Security, CCS (2008)
-
-
Dinaburg, A.1
Royal, P.2
Sharif, M.3
Lee, W.4
-
12
-
-
79959954165
-
Understanding the Web browser threat: Examination of vulnerable online Web browser populations and the insecurity iceberg
-
Frei, S., Dübendorfer, T., Ollman, G., May, M.: Understanding the Web browser threat: Examination of vulnerable online Web browser populations and the insecurity iceberg. In: Proceedings of DefCon, vol. 16 (2008)
-
(2008)
Proceedings of DefCon
, vol.16
-
-
Frei, S.1
Dübendorfer, T.2
Ollman, G.3
May, M.4
-
13
-
-
53349091372
-
Compatibility is Not Transparency: VMM Detection Myths and Realities
-
Garfinkel, T., Adams, K., Warfield, A., Franklin, J.: Compatibility is Not Transparency: VMM Detection Myths and Realities. In: Proceedings of the USENIX Workshop on Hot Topics in Operating Systems (2007)
-
Proceedings of the USENIX Workshop on Hot Topics in Operating Systems (2007)
-
-
Garfinkel, T.1
Adams, K.2
Warfield, A.3
Franklin, J.4
-
14
-
-
84871985573
-
-
Google. Safe Browsing API, http://code.google.com/apis/safebrowsing/
-
Safe Browsing API
-
-
-
15
-
-
79959939651
-
-
Holz, T.: AV Tracker (2009), http://honeyblog.org/archives/37-AV-Tracker. html
-
(2009)
AV Tracker
-
-
Holz, T.1
-
17
-
-
77949441598
-
Stealthy Malware Detection and Monitoring through VMM-Based Out-of-the-Box Semantic View Reconstruction
-
February
-
Jiang, X., Wang, X., Xu, D.: Stealthy Malware Detection and Monitoring through VMM-Based Out-of-the-Box Semantic View Reconstruction. ACM Transactions on Information and System Security (TISSEC) 13(2) (February 2010)
-
(2010)
ACM Transactions on Information and System Security (TISSEC)
, vol.13
, Issue.2
-
-
Jiang, X.1
Wang, X.2
Xu, D.3
-
22
-
-
85008257023
-
Testing CPU Emulators
-
Martignoni, L., Paleari, R., Roglia, G.F., Bruschi, D.: Testing CPU Emulators. In: Proceedings of the International Symposium on Software Testing and Analysis, ISSTA (2009)
-
Proceedings of the International Symposium on Software Testing and Analysis, ISSTA (2009)
-
-
Martignoni, L.1
Paleari, R.2
Roglia, G.F.3
Bruschi, D.4
-
23
-
-
79959961954
-
-
Microsoft. What is SmartScreen Filter?, http://www.microsoft.com/ security/filters/smartscreen.aspx
-
What Is SmartScreen Filter?
-
-
-
24
-
-
79959985659
-
-
MITRE
-
MITRE. HoneyClient, http://www.honeyclient.org/
-
-
-
-
25
-
-
85076893377
-
SpyProxy: Execution-based Detection of Malicious Web Content
-
Moshchuk, A., Bragin, T., Deville, D., Gribble, S., Levy, H.: SpyProxy: Execution-based Detection of Malicious Web Content. In: Proceedings of the USENIX Security Symposium (2007)
-
Proceedings of the USENIX Security Symposium (2007)
-
-
Moshchuk, A.1
Bragin, T.2
Deville, D.3
Gribble, S.4
Levy, H.5
-
26
-
-
40249106140
-
A Crawler-based Study of Spyware in the Web
-
Moshchuk, A., Bragin, T., Gribble, S., Levy, H.: A Crawler-based Study of Spyware in the Web. In: Proceedings of the Symposium on Network and Distributed System Security, NDSS (2006)
-
Proceedings of the Symposium on Network and Distributed System Security, NDSS (2006)
-
-
Moshchuk, A.1
Bragin, T.2
Gribble, S.3
Levy, H.4
-
28
-
-
77950831023
-
MAVMM: Lightweight and Purpose Built VMM for Malware Analysis
-
Nguyen, A., Schear, N., Jung, H., Godiyal, A., King, S., Nguyen, H.:MAVMM: Lightweight and Purpose Built VMM for Malware Analysis. In: Proceedings of the Annual Computer Security Applications Conference, ACSAC (2009)
-
Proceedings of the Annual Computer Security Applications Conference, ACSAC (2009)
-
-
Nguyen, A.1
Schear, N.2
Jung, H.3
Godiyal, A.4
King, S.5
Nguyen, H.6
-
29
-
-
84888464159
-
-
Norman Sandbox (2009), http://www.norman.com/about-norman/technology/ norman-sandbox/
-
(2009)
Norman Sandbox
-
-
-
30
-
-
85084163236
-
A Fistful of Red-Pills: How to Automatically Generate Procedures to Detect CPU Emulators
-
Paleari, R., Martignoni, L., Roglia, G.F., Bruschi, D.: A Fistful of Red-Pills: How to Automatically Generate Procedures to Detect CPU Emulators. In: Proceedings of the USENIX Workshop on Offensive Technologies, WOOT (2009)
-
Proceedings of the USENIX Workshop on Offensive Technologies, WOOT (2009)
-
-
Paleari, R.1
Martignoni, L.2
Roglia, G.F.3
Bruschi, D.4
-
31
-
-
85084094824
-
Ghost Turns Zombie: Exploring the Life Cycle of Web-based Malware
-
Polychronakis, M., Mavrommatis, P., Provos, N.: Ghost Turns Zombie: Exploring the Life Cycle of Web-based Malware. In: Proceedings of the USENIX Workshop on Large-Scale Exploits and Emergent Threats, LEET (2008)
-
Proceedings of the USENIX Workshop on Large-Scale Exploits and Emergent Threats, LEET (2008)
-
-
Polychronakis, M.1
Mavrommatis, P.2
Provos, N.3
-
32
-
-
80053650188
-
All Your iFRAMEs Point to Us
-
Provos, N., Mavrommatis, P., Rajab, M., Monrose, F.: All Your iFRAMEs Point to Us. In: Proceedings of the USENIX Security Symposium (2008)
-
Proceedings of the USENIX Security Symposium (2008)
-
-
Provos, N.1
Mavrommatis, P.2
Rajab, M.3
Monrose, F.4
-
33
-
-
85080711655
-
The Ghost in the Browser: Analysis of Web-based Malware
-
Provos, N., McNamee, D., Mavrommatis, P., Wang, K., Modadugu, N.: The Ghost in the Browser: Analysis of Web-based Malware. In: Proceedings of the USENIX Workshop on Hot Topics in Understanding Botnet (2007)
-
Proceedings of the USENIX Workshop on Hot Topics in Understanding Botnet (2007)
-
-
Provos, N.1
McNamee, D.2
Mavrommatis, P.3
Wang, K.4
Modadugu, N.5
-
34
-
-
0004145058
-
-
Technical report, Secure Networks, Inc.
-
Ptacek, T., Newsham, T.: Insertion, Evasion, and Denial of Service: Eluding Network Intrusion Detection. Technical report, Secure Networks, Inc. (1998)
-
(1998)
Insertion, Evasion, and Denial of Service: Eluding Network Intrusion Detection
-
-
Ptacek, T.1
Newsham, T.2
-
39
-
-
74049145643
-
Secure In-VM Monitoring Using Hardware Virtualization
-
Sharif, M., Lee, W., Cui, W., Lanzi, A.: Secure In-VM Monitoring Using Hardware Virtualization. In: Proceedings of the ACMConference on Computer and Communications Security, CCS (2009)
-
Proceedings of the ACMConference on Computer and Communications Security, CCS (2009)
-
-
Sharif, M.1
Lee, W.2
Cui, W.3
Lanzi, A.4
-
40
-
-
84872102454
-
-
The Honeynet Project. Capture-HPC, https://projects.honeynet.org/capture- hpc
-
Capture-HPC
-
-
-
41
-
-
79959938245
-
-
ThreatExpert (2009), http://www.threatexpert.com/
-
(2009)
ThreatExpert
-
-
-
43
-
-
48649105242
-
Feature Omission Vulnerabilities: Thwarting Signature Generation for Polymorphic Worms
-
Van Gundy, M., Chen, H., Su, Z., Vigna, G.: Feature Omission Vulnerabilities: Thwarting Signature Generation for Polymorphic Worms. In: Proceedings of the Annual Computer Security Applications Conference, ACSAC (2007)
-
Proceedings of the Annual Computer Security Applications Conference, ACSAC (2007)
-
-
Van Gundy, M.1
Chen, H.2
Su, Z.3
Vigna, G.4
-
46
-
-
35948937558
-
Automated Web Patrol with Strider HoneyMonkeys: Finding Web Sites That Exploit Browser Vulnerabilities
-
Wang, Y.-M., Beck, D., Jiang, X., Roussev, R., Verbowski, C., Chen, S., King, S.: Automated Web Patrol with Strider HoneyMonkeys: Finding Web Sites That Exploit Browser Vulnerabilities. In: Proceedings of the Symposium on Network and Distributed System Security, NDSS (2006)
-
Proceedings of the Symposium on Network and Distributed System Security, NDSS (2006)
-
-
Wang, Y.-M.1
Beck, D.2
Jiang, X.3
Roussev, R.4
Verbowski, C.5
Chen, S.6
King, S.7
-
47
-
-
77955044524
-
HookScout: Proactive Binary-Centric Hook Detection
-
Yin, H., Poosankam, P., Hanna, S., Song, D.: HookScout: Proactive Binary-Centric Hook Detection. In: Proceedings of the Conference on Detection of Intrusions and Malware & Vulnerability Assessment, DIMVA (2010)
-
Proceedings of the Conference on Detection of Intrusions and Malware & Vulnerability Assessment, DIMVA (2010)
-
-
Yin, H.1
Poosankam, P.2
Hanna, S.3
Song, D.4
|