-
1
-
-
0004072686
-
-
Addison-Wesley Longman Publishing Co., Inc. Redwood City
-
Aho, A.V., Sethi, R., Ullman, J.D.: Compilers: principles, techniques, and tools. Addison-Wesley Longman Publishing Co., Inc. Redwood City (1986)
-
(1986)
Compilers: Principles, Techniques, and Tools
-
-
Aho, A.V.1
Sethi, R.2
Ullman, J.D.3
-
3
-
-
70349990723
-
Architecture of a morphological malware detector
-
Bonfante, G., Kaczmarek, M., Marion, J.Y.: Architecture of a morphological malware detector. Journal in Computer Virology 5, 263-270 (2009)
-
(2009)
Journal in Computer Virology
, vol.5
, pp. 263-270
-
-
Bonfante, G.1
Kaczmarek, M.2
Marion, J.Y.3
-
4
-
-
84882738195
-
Automatically Identifying Trigger-based Behavior in Malware
-
Springer, Heidelberg
-
Brumley, D., Hartwig, C., Zhenkai Liang, J.N., Song, D., Yin, H.: Automatically Identifying Trigger-based Behavior in Malware. In: Botnet Detection Countering the Largest Security Threat, Advances in Information Security, vol. 36, pp. 65-88. Springer, Heidelberg (2008)
-
(2008)
Botnet Detection Countering the Largest Security Threat, Advances in Information Security
, vol.36
, pp. 65-88
-
-
Brumley, D.1
Hartwig, C.2
Zhenkai Liang, J.N.3
Song, D.4
Yin, H.5
-
5
-
-
85084160792
-
Understanding data life-time via whole system simulation
-
Chow, J., Pfaff, B., Garfinkel, T., Christopher, K., Rosenblum, M.: Understanding data life-time via whole system simulation. In: Proc. of 13th USENIX Security Symp. (2004)
-
Proc. of 13th USENIX Security Symp. (2004)
-
-
Chow, J.1
Pfaff, B.2
Garfinkel, T.3
Christopher, K.4
Rosenblum, M.5
-
7
-
-
37849017546
-
Mining specifications of malicious behavior
-
ACM Press, New York
-
Christodorescu, M., Jha, S., Kruegel, C.: Mining specifications of malicious behavior. In: Proc. of the the 6th Joint Meeting of the European Software Engineering Conf. and the ACM SIGSOFT Symp. on The Foundations of Software Engineering, pp. 5-14. ACM Press, New York (2007)
-
(2007)
Proc. of the the 6th Joint Meeting of the European Software Engineering Conf. and the ACM SIGSOFT Symp. on the Foundations of Software Engineering
, pp. 5-14
-
-
Christodorescu, M.1
Jha, S.2
Kruegel, C.3
-
8
-
-
27544433210
-
Semantics-aware malware detection
-
IEEE Computer Society Press, Los Alamitos
-
Christodorescu, M., Jha, S., Seshia, S.A., Song, D., Bryant, R.E.: Semantics-aware malware detection. In: SP 2005: Proc. of the 2005 IEEE Symp. on Security and Privacy, pp. 32-46. IEEE Computer Society Press, Los Alamitos (2005)
-
(2005)
SP 2005: Proc. of the 2005 IEEE Symp. on Security and Privacy
, pp. 32-46
-
-
Christodorescu, M.1
Jha, S.2
Seshia, S.A.3
Song, D.4
Bryant, R.E.5
-
9
-
-
0004060205
-
-
Comon, H., Dauchet, M., Gilleron, R., Löding, C., Jacquemard, F., Lugiez, D., Tison, S., Tommasi, M.: Tree Automata Techniques and Applications (2007)
-
(2007)
Tree Automata Techniques and Applications
-
-
Comon, H.1
Dauchet, M.2
Gilleron, R.3
Löding, C.4
Jacquemard, F.5
Lugiez, D.6
Tison, S.7
Tommasi, M.8
-
10
-
-
0004116989
-
-
2nd edn. The MIT Press, Cambridge
-
Cormen, T.H., Leiserson, C.E., Rivest, R.L., Stein, C.: Introduction to Algorithms, 2nd edn. The MIT Press, Cambridge (2001)
-
(2001)
Introduction to Algorithms
-
-
Cormen, T.H.1
Leiserson, C.E.2
Rivest, R.L.3
Stein, C.4
-
11
-
-
21644482450
-
Minos: Control data attack prevention orthogonal to memory model
-
IEEE Computer Society Press, Los Alamitos
-
Crandall, J., Chong, F.: Minos: Control data attack prevention orthogonal to memory model. In: the Proc. of the 37th Int. Symp. on Microarchitecture, pp. 221-232. IEEE Computer Society Press, Los Alamitos (2005)
-
(2005)
The Proc. of the 37th Int. Symp. on Microarchitecture
, pp. 221-232
-
-
Crandall, J.1
Chong, F.2
-
12
-
-
0029716418
-
A sense of self for unix processes
-
IEEE Computer Society Press, Los Alamitos
-
Forrest, S., Hofmeyr, S.A., Somayaji, A., Longstaff, T.A.: A sense of self for unix processes. In: Proc. of the 1996 IEEE Symp. on Security and Privacy, pp. 120-129. IEEE Computer Society Press, Los Alamitos (1996)
-
(1996)
Proc. of the 1996 IEEE Symp. on Security and Privacy
, pp. 120-129
-
-
Forrest, S.1
Hofmeyr, S.A.2
Somayaji, A.3
Longstaff, T.A.4
-
13
-
-
77955210614
-
Synthesizing near-optimal malware specifications from suspicious behaviors
-
IEEE Computer Society Press, Los Alamitos
-
Fredrikson, M., Jha, S., Christodorescu, M., Sailer, R., Yan, X.: Synthesizing near-optimal malware specifications from suspicious behaviors. In: Proc. of the 2010 IEEE Symp. on Security and Privacy, pp. 45-60. IEEE Computer Society Press, Los Alamitos (2010)
-
(2010)
Proc. of the 2010 IEEE Symp. on Security and Privacy
, pp. 45-60
-
-
Fredrikson, M.1
Jha, S.2
Christodorescu, M.3
Sailer, R.4
Yan, X.5
-
14
-
-
0006776326
-
-
Tech. rep. In: Dept. Syst. Inform. Comput. Univ. Politecnica Valencia, Spain
-
García, P.: Learning k-testable tree sets from positive data. Tech. rep. In: Dept. Syst. Inform. Comput. Univ. Politecnica Valencia, Spain (1993)
-
(1993)
Learning K-testable Tree Sets from Positive Data
-
-
García, P.1
-
15
-
-
0025484018
-
Inference of k-testable languages in the strict sense and application to syntactic pattern recognition
-
García, P., Vidal, E.: Inference of k-testable languages in the strict sense and application to syntactic pattern recognition. IEEE Trans. Pattern Anal. Mach. Intell. 12, 920-925 (1990)
-
(1990)
IEEE Trans. Pattern Anal. Mach. Intell.
, vol.12
, pp. 920-925
-
-
García, P.1
Vidal, E.2
-
16
-
-
31844450371
-
DART: Directed automated random testing
-
ACM Press, New York
-
Godefroid, P., Klarlund, N., Sen, K.: DART: directed automated random testing. In: Proc. of the ACM SIGPLAN Conf. on Prog. Lang. Design and Impl. pp. 213-223. ACM Press, New York (2005)
-
(2005)
Proc. of the ACM SIGPLAN Conf. on Prog. Lang. Design and Impl.
, pp. 213-223
-
-
Godefroid, P.1
Klarlund, N.2
Sen, K.3
-
17
-
-
0001187706
-
Complexity of automaton identification from given data
-
Gold, E.M.: Complexity of automaton identification from given data. Information and Control 37(3), 302-320 (1978)
-
(1978)
Information and Control
, vol.37
, Issue.3
, pp. 302-320
-
-
Gold, E.M.1
-
18
-
-
38449121202
-
Using verification technology to specify and detect malware
-
Moreno Díaz, R., Pichler, F., Quesada Arencibia, A. (eds.) EUROCAST 2007. Springer, Heidelberg
-
Holzer, A., Kinder, J., Veith, H.: Using verification technology to specify and detect malware. In: Moreno Díaz, R., Pichler, F., Quesada Arencibia, A. (eds.) EUROCAST 2007. LNCS, vol. 4739, pp. 497-504. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4739
, pp. 497-504
-
-
Holzer, A.1
Kinder, J.2
Veith, H.3
-
19
-
-
84866721423
-
DTA++: Dynamic taint analysis with targeted control-flow propagation
-
Kang, M.G., McCamant, S., Poosankam, P., Song, D.: DTA++: Dynamic taint analysis with targeted control-flow propagation. In: Proc. of the 18th Annual Network and Distributed System Security Symp.San Diego, CA (2011)
-
Proc. of the 18th Annual Network and Distributed System Security Symp.San Diego, CA (2011)
-
-
Kang, M.G.1
McCamant, S.2
Poosankam, P.3
Song, D.4
-
21
-
-
0016971687
-
Symbolic execution and program testing
-
King, J.C.: Symbolic execution and program testing. Comm. of the ACM 19(7), 385-394 (1976)
-
(1976)
Comm. of the ACM
, vol.19
, Issue.7
, pp. 385-394
-
-
King, J.C.1
-
23
-
-
85076206522
-
Effective and efficient malware detection at the end host
-
Kolbitsch, C., Milani, P., Kruegel, C., Kirda, E., Zhou, X., Wang, X.: Effective and efficient malware detection at the end host. In: The 18th USENIX Security Symp. (2009)
-
The 18th USENIX Security Symp. (2009)
-
-
Kolbitsch, C.1
Milani, P.2
Kruegel, C.3
Kirda, E.4
Zhou, X.5
Wang, X.6
-
24
-
-
3442887990
-
Inference of reversible tree languages
-
López, D., Sempere, J.M., García, P.: Inference of reversible tree languages. IEEE Transactions on Systems, Man, and Cybernetics, Part B 34(4), 1658-1665 (2004)
-
(2004)
IEEE Transactions on Systems, Man, and Cybernetics, Part B
, vol.34
, Issue.4
, pp. 1658-1665
-
-
López, D.1
Sempere, J.M.2
García, P.3
-
25
-
-
31944440969
-
Pin: Building customized program analysis tools with dynamic instrumentation
-
ACM Press, New York
-
Luk, C., Cohn, R., Muth, R., Patil, H., Klauser, A., Lowney, G., Wallace, S., Reddi, V., Hazelwood, K.: Pin: building customized program analysis tools with dynamic instrumentation. In: Proc. of the 2005 ACM SIGPLAN Conf. on Prog. Lang. Design and Impl., pp. 190-200. ACM Press, New York (2005)
-
(2005)
Proc. of the 2005 ACM SIGPLAN Conf. on Prog. Lang. Design and Impl.
, pp. 190-200
-
-
Luk, C.1
Cohn, R.2
Muth, R.3
Patil, H.4
Klauser, A.5
Lowney, G.6
Wallace, S.7
Reddi, V.8
Hazelwood, K.9
-
27
-
-
79960349207
-
-
Tech. rep. Eset
-
Matrosov, A., Rodionov, E., Harley, D., Malcho, J.: Stuxnet under the microscope. Tech. rep. Eset (2010)
-
(2010)
Stuxnet under the Microscope
-
-
Matrosov, A.1
Rodionov, E.2
Harley, D.3
Malcho, J.4
-
28
-
-
34548737161
-
Exploring multiple execution paths for malware analysis
-
IEEE Computer Society Press, Los Alamitos
-
Moser, A., Kruegel, C., Kirda, E.: Exploring multiple execution paths for malware analysis. In: SP 2007: Proc. of the IEEE Symp. on Security and Privacy, pp. 231-245. IEEE Computer Society Press, Los Alamitos (2007)
-
(2007)
SP 2007: Proc. of the IEEE Symp. on Security and Privacy
, pp. 231-245
-
-
Moser, A.1
Kruegel, C.2
Kirda, E.3
-
29
-
-
27544444280
-
Dynamic Taint Analysis: Automatic Detection, Analysis, and Signature Generation of Exploit Attacks on Commodity Software
-
Newsome, J., Song, D.: Dynamic Taint Analysis: Automatic Detection, Analysis, and Signature Generation of Exploit Attacks on Commodity Software. In: Proc. of the Network and Distributed Systems Security Symp. (2005)
-
Proc. of the Network and Distributed Systems Security Symp. (2005)
-
-
Newsome, J.1
Song, D.2
-
30
-
-
12844267418
-
Secure program execution via dynamic information flow tracking
-
Suh, G., Lee, J., Zhang, D., Devadas, S.: Secure program execution via dynamic information flow tracking. ACM SIGOPS Operating Systems Review 38(5), 85-96 (2004)
-
(2004)
ACM SIGOPS Operating Systems Review
, vol.38
, Issue.5
, pp. 85-96
-
-
Suh, G.1
Lee, J.2
Zhang, D.3
Devadas, S.4
-
32
-
-
0034836394
-
Intrusion detection via static analysis
-
IEEE Computer Society Press, Los Alamitos
-
Wagner, D., Dean, D.: Intrusion detection via static analysis. In: Proc. of the IEEE Symp. on Security and Privacy, p. 156. IEEE Computer Society Press, Los Alamitos (2001)
-
(2001)
Proc. of the IEEE Symp. on Security and Privacy
, pp. 156
-
-
Wagner, D.1
Dean, D.2
-
34
-
-
79952099736
-
Malware Obfuscation Techniques: A Brief Survey
-
You, I., Yim, K.: Malware Obfuscation Techniques: A Brief Survey. In: Int. Conf. on Broadband, Wireless Computing, Communication and Applications, pp. 297-300 (2010)
-
(2010)
Int. Conf. on Broadband, Wireless Computing, Communication and Applications
, pp. 297-300
-
-
You, I.1
Yim, K.2
-
35
-
-
0012883458
-
Locally testable languages
-
Zalcstein, Y.: Locally testable languages. J. Comput. Syst. Sci. 6(2), 151-167 (1972)
-
(1972)
J. Comput. Syst. Sci.
, vol.6
, Issue.2
, pp. 151-167
-
-
Zalcstein, Y.1
|