-
4
-
-
48649100256
-
Spector: Automatically analyzing shell code
-
Borders, K., Prakash, A., Zielinski, M.: Spector: automatically analyzing shell code. In: Proceedings of the 23rd Annual Computer Security Applications Conference, pp. 501-514 (2007).
-
(2007)
Proceedings of the 23rd Annual Computer Security Applications Conference
, pp. 501-514
-
-
Borders, K.1
Prakash, A.2
Zielinski, M.3
-
5
-
-
77953301922
-
Malicious shellcode detection with virtual memory snapshots
-
Gu, B., Bai, X., Yang, Z., Adam, C., Xuan, D.: Malicious shellcode detection with virtual memory snapshots. In: Proceedings of IEEE International Conference on Computer Communications (IEEE INFOCOM) (2010).
-
(2010)
Proceedings of IEEE International Conference On Computer Communications (IEEE INFOCOM)
-
-
Gu, B.1
Bai, X.2
Yang, Z.3
Adam, C.4
Xuan, D.5
-
6
-
-
85077688456
-
Towards automatic discovery of deviations in binary implementations with applications to error detection and fingerprint generation
-
Brumley, D., Caballero, J., Liang, Z., Newsome, J., Song, D.: Towards automatic discovery of deviations in binary implementations with applications to error detection and fingerprint generation. In: Proceedings of the 16th USENIX Security (2007).
-
(2007)
Proceedings of the 16th USENIX Security
-
-
Brumley, D.1
Caballero, J.2
Liang, Z.3
Newsome, J.4
Song, D.5
-
7
-
-
27544433210
-
Semantics-aware malware detection
-
Christodorescu, M., Jha, S., Seshia, S., Song, D., Bryant, R.: Semantics-aware malware detection. In: 2005 IEEE Symposium on Security and Privacy (2005).
-
(2005)
2005 IEEE Symposium On Security and Privacy
-
-
Christodorescu, M.1
Jha, S.2
Seshia, S.3
Song, D.4
Bryant, R.5
-
8
-
-
38149123929
-
Advanced allergy attacks: Does a corpus really help
-
Springer, Berlin
-
Chung, S. P., Mok, A. K.: Advanced allergy attacks: Does a corpus really help. In: Recent Advances in Intrusion Detection (RAID), pp. 236-255. Springer, Berlin (2007).
-
(2007)
Recent Advances In Intrusion Detection (RAID)
, pp. 236-255
-
-
Chung, S.P.1
Mok, A.K.2
-
9
-
-
0004046658
-
-
Technical Report 148, University of Auckland
-
Collberg, C., Thomborson, C., Low, D.: A taxonomy of obfuscating transformations. In: Technical Report 148, University of Auckland (1997).
-
(1997)
A Taxonomy of Obfuscating Transformations
-
-
Collberg, C.1
Thomborson, C.2
Low, D.3
-
10
-
-
27544481859
-
-
Detristan, T., Ulenspiegel, T., Malcom, Y., Superbus, M., Underduk, V.: Polymorphic shellcode engine using spectrum analysis. http://www. phrack. org/show. php?p=61&a=9.
-
Polymorphic Shellcode Engine Using Spectrum Analysis
-
-
Detristan, T.1
Ulenspiegel, T.2
Malcom, Y.3
Superbus, M.4
Underduk, V.5
-
11
-
-
85077703150
-
Polymorphic blending attacks
-
Fogla, P., Sharif, M., Perdisci, R., Kolesnikov, O., Lee, W.: Polymorphic blending attacks. In: Proceedings of The 15th USENIX Security Symposium (2006).
-
(2006)
Proceedings of the 15th USENIX Security Symposium
-
-
Fogla, P.1
Sharif, M.2
Perdisci, R.3
Kolesnikov, O.4
Lee, W.5
-
12
-
-
80052960056
-
Mtpa-a processor architecture for mp-socs employing the moving threads paradigm
-
Forsell, M., Leppänen, V.: Mtpa-a processor architecture for mp-socs employing the moving threads paradigm. In: PDPTA, pp. 198-204 (2009).
-
(2009)
PDPTA
, pp. 198-204
-
-
Forsell, M.1
Leppänen, V.2
-
13
-
-
85084160549
-
Catch me, if you can: Evading network signatures with web-based polymorphic worms
-
Boston, MA
-
Gundy, M. V., Balzarotti, D., Vigna, G.: Catch me, if you can: Evading network signatures with web-based polymorphic worms. In: Proceedings of the First USENIX Workshop on Offensive Technologies (WOOT) Boston, MA (2007).
-
(2007)
Proceedings of the First USENIX Workshop On Offensive Technologies (WOOT)
-
-
Gundy, M.V.1
Balzarotti, D.2
Vigna, G.3
-
14
-
-
48649105242
-
Feature omission vulnerabilities: Thwarting signature generation for polymorphic worms
-
Gundy, M. V., Chen, H., Su, Z., Vigna, G.: Feature omission vulnerabilities: thwarting signature generation for polymorphic worms. In: Proceeding of Annual Computer Security Applications Conference (ACSAC) (2007).
-
(2007)
Proceeding of Annual Computer Security Applications Conference (ACSAC)
-
-
Gundy, M.V.1
Chen, H.2
Su, Z.3
Vigna, G.4
-
15
-
-
33846309686
-
e-nexsh: Achieving an effectively non-executable stack and heap via system-call policing
-
Kc, G. S., Keromytis, A. D.: e-nexsh: achieving an effectively non-executable stack and heap via system-call policing. In: ACSAC, pp. 286-302 (2005).
-
(2005)
ACSAC
, pp. 286-302
-
-
Kc, G.S.1
Keromytis, A.D.2
-
19
-
-
38149093160
-
Emulation-based detection of non-self-contained polymorphic shellcode
-
Springer, Berlin
-
Krügel, C., Lippmann, R., Clark, A.: Emulation-based detection of non-self-contained polymorphic shellcode. In: Recent Advances in Intrusion Detection, 10th International Symposium, Lecture Notes in Computer Science, vol. 4637. Springer, Berlin (2007).
-
(2007)
Recent Advances In Intrusion Detection, 10th International Symposium, Lecture Notes In Computer Science
, vol.4637
-
-
Krügel, C.1
Lippmann, R.2
Clark, A.3
-
21
-
-
33751064824
-
Hamsa: Fast signature generation for zero-day polymorphic worms with provable attack resilience
-
Li, Z., Sanghi, M., Chen, Y., Kao, M. Y., Chavez, B.: Hamsa: fast signature generation for zero-day polymorphic worms with provable attack resilience. In: IEEE Symposium on Security and Privacy (2006).
-
(2006)
IEEE Symposium On Security and Privacy
-
-
Li, Z.1
Sanghi, M.2
Chen, Y.3
Kao, M.Y.4
Chavez, B.5
-
25
-
-
74049102282
-
English shellcode
-
ACM
-
Mason, J., Small, S., Monrose, F., MacManus, G.: English shellcode. In: ACM Conference on Computer and Communications Security. ACM (2009).
-
(2009)
ACM Conference On Computer and Communications Security
-
-
Mason, J.1
Small, S.2
Monrose, F.3
Macmanus, G.4
-
29
-
-
33750332606
-
Paragraph: Thwarting signature learning by training maliciously
-
Springer, Berlin
-
Newsome, J., Karp, B., Song, D.: Paragraph: thwarting signature learning by training maliciously. In: Recent Advances in Intrusion Detection (RAID), pp. 81-105. Springer, Berlin (2006).
-
(2006)
Recent Advances In Intrusion Detection (RAID)
, pp. 81-105
-
-
Newsome, J.1
Karp, B.2
Song, D.3
-
30
-
-
79953672829
-
Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software
-
Newsome, J., Song, D.: Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software. In: Proceedings of Network and Distributed System Security Symposium (2005).
-
(2005)
Proceedings of Network and Distributed System Security Symposium
-
-
Newsome, J.1
Song, D.2
-
31
-
-
12244295760
-
Adversarial classification
-
Pedro, N. D., Domingos, P., Sumit, M., Verma, S. D.: Adversarial classification. In: 10th ACM SIGKDD Conference On Knowledge Discovery and Data mining, pp. 99-108 (2004).
-
(2004)
10th ACM SIGKDD Conference On Knowledge Discovery and Data Mining
, pp. 99-108
-
-
Pedro, N.D.1
Domingos, P.2
Sumit, M.3
Verma, S.D.4
-
33
-
-
0024610919
-
A tutorial on hidden markov models and selected applications in speech recognition
-
Rabiner L. R.: A tutorial on hidden markov models and selected applications in speech recognition. Proceedings of the IEEE 77(2), 257-286 (1999).
-
(1999)
Proceedings of the IEEE
, vol.77
, Issue.2
, pp. 257-286
-
-
Rabiner, L.R.1
-
34
-
-
80052954590
-
-
Ray, E.: Ms-sql worm. http://www. sans. org/resources/malwarefaq/ms-sql-exploit. php.
-
Ms-sql Worm
-
-
Ray, E.1
-
35
-
-
14844309952
-
-
San Diego: University of California at San Diego
-
Singh S., Estan C., Varghese G., Savage S.: Earlybird System for Real-Time Detection of Unknown Worms, Technical Report. University of California at San Diego, San Diego (2003).
-
(2003)
Earlybird System for Real-Time Detection of Unknown Worms, Technical Report
-
-
Singh, S.1
Estan, C.2
Varghese, G.3
Savage, S.4
-
36
-
-
33845453072
-
Dira: Automatic detection, identification and repair of control-hijacking attacks
-
Smirnov, A., cker Chiueh, T.: Dira: Automatic detection, identification and repair of control-hijacking attacks. In: NDSS (2005).
-
(2005)
NDSS
-
-
Smirnov, A.1
cker Chiueh, T.2
-
37
-
-
41549098765
-
On the infeasibility of modeling polymorphic shellcode
-
Song, Y., Locasto, M. E., Stavrou, A., Keromytis, A. D., Stolfo, S. J.: On the infeasibility of modeling polymorphic shellcode. In: Proceedings of the 14th ACM conference on Computer and Communications Security(CCS), pp. 541-551 (2007).
-
(2007)
Proceedings of the 14th ACM Conference On Computer and Communications Security(CCS)
, pp. 541-551
-
-
Song, Y.1
Locasto, M.E.2
Stavrou, A.3
Keromytis, A.D.4
Stolfo, S.J.5
-
40
-
-
60649104827
-
Still: Exploit code detection via static taint and initialization analyses
-
Wang, X., Jhi, Y. C., Zhu, S., Liu, P.: Still: exploit code detection via static taint and initialization analyses. In: Proceedings of Anual Computer Security Applications Conference (ACSAC) (2008).
-
(2008)
Proceedings of Anual Computer Security Applications Conference (ACSAC)
-
-
Wang, X.1
Jhi, Y.C.2
Zhu, S.3
Liu, P.4
-
41
-
-
85027555608
-
Sigfree: a signature-free buffer overflow attack blocker
-
Wang, X., Pan, C. C., Liu, P., Zhu, S.: Sigfree: a signature-free buffer overflow attack blocker. In: 15th Usenix Security Symposium (2006).
-
(2006)
15th Usenix Security Symposium
-
-
Wang, X.1
Pan, C.C.2
Liu, P.3
Zhu, S.4
|