-
2
-
-
41549098765
-
On the infeasibility of modeling polymorphic shellcode
-
Y. Song, M. E. Locasto, A. Stavrou, A. D. Keromytis, S. J. Stolfo, On the infeasibility of modeling polymorphic shellcode, Proceedings of the 14th ACM conference on Computer and communications security, pp. 541-551, 2007.
-
(2007)
Proceedings of the 14th ACM Conference on Computer and Communications Security
, pp. 541-551
-
-
Song, Y.1
Locasto, M.E.2
Stavrou, A.3
Keromytis, A.D.4
Stolfo, S.J.5
-
3
-
-
34047129159
-
Using entropy analysis to find encrypted and packed malware
-
R. Lyda, J. Hamrock, Using entropy analysis to find encrypted and packed malware, IEEE Security and Privacy, v.5, n.2, pp. 40-45, 2007.
-
(2007)
IEEE Security and Privacy
, vol.5
, Issue.2
, pp. 40-45
-
-
Lyda, R.1
Hamrock, J.2
-
4
-
-
38149089416
-
Automated classification and analysis of internet malware
-
M. Bailey, J. Oberheide, J. Andersen, Z. Morley Mao, F. Jahanian, J. Nazario, Automated classification and analysis of internet malware, RAID 2007, pp. 178-197, 2007.
-
(2007)
RAID 2007
, pp. 178-197
-
-
Bailey, M.1
Oberheide, J.2
Andersen, J.3
Morley Mao, Z.4
Jahanian, F.5
Nazario, J.6
-
5
-
-
33746882464
-
Malware phylogeny generation using permutations of code
-
Nov.
-
M. E. Karim, A. Walenstein, A. Lakhotia, and L. Parida, Malware phylogeny generation using permutations of code. European Research Journal of Computer Virology 1, 1-2 (Nov. 2005) pp. 13-23.
-
(2005)
European Research Journal of Computer Virology
, vol.1
, Issue.1-2
, pp. 13-23
-
-
Karim, M.E.1
Walenstein, A.2
Lakhotia, A.3
Parida, L.4
-
6
-
-
54849414050
-
An automated virus classification system
-
October
-
M. Gheorghescu. An automated virus classification system. In Proc. Virus Bulletin Conf., pp.294-299, October 2005.
-
(2005)
Proc. Virus Bulletin Conf.
, pp. 294-299
-
-
Gheorghescu, M.1
-
7
-
-
70350666613
-
Static CFG analyzer for metamorphic Malware code
-
Vinod P., Vijay Laxmi, Manoj Singh Gaur, G. V. S. S. Phani Kumar, Yadvendra S. Chundawat, Static CFG analyzer for metamorphic Malware code. SIN 2009, pp. 225-228, 2009.
-
(2009)
SIN 2009
, pp. 225-228
-
-
Vinod, P.1
Laxmi, V.2
Gaur, M.S.3
Phani Kumar, G.V.S.S.4
Chundawat, Y.S.5
-
8
-
-
54849432819
-
Digital Genome Mapping - Advanced Binary Malware Analysis
-
E. Carrera and G. Erdelyi, Digital Genome Mapping - Advanced Binary Malware Analysis, In Proc. Virus Bulletin Conf., pp. 187-197, 2004.
-
(2004)
Proc. Virus Bulletin Conf.
, pp. 187-197
-
-
Carrera, E.1
Erdelyi, G.2
-
9
-
-
0015960104
-
The String-to-String Correction Problem
-
R. A. Wagner and M. J. Fischer, The String-to-String Correction Problem, Journal of the ACM (JACM), v.21 n.1, pp. 168-173, 1974.
-
(1974)
Journal of the ACM (JACM)
, vol.21
, Issue.1
, pp. 168-173
-
-
Wagner, R.A.1
Fischer, M.J.2
-
10
-
-
84963799341
-
Speeding-up Hirschberg and Hunt-Szymanski LCS algorithms
-
M. Crochemore, C. S. Iliopoulos, and Y. J. Pinzon, Speeding-up Hirschberg and Hunt-Szymanski LCS algorithms, String Processing and Information Retrieval, pp. 59-67, 2001.
-
(2001)
String Processing and Information Retrieval
, pp. 59-67
-
-
Crochemore, M.1
Iliopoulos, C.S.2
Pinzon, Y.J.3
-
14
-
-
80052157550
-
-
OllyBonE, http://www.joestewart.org/ollybone/.
-
OllyBonE
-
-
-
18
-
-
56549090955
-
A Study of the Packer Problem and Its Solutions
-
F. Guo, P. Ferrie, and T. Chiueh, A Study of the Packer Problem and Its Solutions, RAID 2008, pp. 98-115, 2008.
-
(2008)
RAID 2008
, pp. 98-115
-
-
Guo, F.1
Ferrie, P.2
Chiueh, T.3
|