-
4
-
-
73449134031
-
Anti-debugging and anti-emulation techniques
-
A. Danielescu. Anti-debugging and anti-emulation techniques. CodeBreakers Journal, 5(1), 2008. Available online: http://www.codebreakers-journal.com/.
-
(2008)
CodeBreakers Journal
, vol.5
, Issue.1
-
-
Danielescu, A.1
-
5
-
-
79958191725
-
-
Data Rescue. Universal PE Unpacker plug-in. Available online: http://www.datarescue.com/idabase/unpack-pe.
-
Universal PE Unpacker Plug-in
-
-
-
7
-
-
79958216590
-
-
Faster Universal Unpacker, 1999. Available online: http://code.google. com/p/fuu/.
-
(1999)
Faster Universal Unpacker
-
-
-
12
-
-
0001600762
-
Information gain and a general measure of correlation
-
J. Kent. Information gain and a general measure of correlation. Biometrika, 70(1):163-173, 1983.
-
(1983)
Biometrika
, vol.70
, Issue.1
, pp. 163-173
-
-
Kent, J.1
-
13
-
-
34047129159
-
Using entropy analysis to find encrypted and packed malware
-
R. Lyda and J. Hamrock. Using entropy analysis to find encrypted and packed malware. IEEE Security & Privacy, 5(2):40-45, 2007.
-
(2007)
IEEE Security & Privacy
, vol.5
, Issue.2
, pp. 40-45
-
-
Lyda, R.1
Hamrock, J.2
-
14
-
-
48649084773
-
Omniunpack: Fast, generic, and safe unpacking of malware
-
L. Martignoni, M. Christodorescu, and S. Jha. Omniunpack: Fast, generic, and safe unpacking of malware. In Proceedings of the 2007 Annual Computer Security Applications Conference (ACSAC), pages 431-441, 2007.
-
Proceedings of the 2007 Annual Computer Security Applications Conference (ACSAC)
, vol.2007
, pp. 431-441
-
-
Martignoni, L.1
Christodorescu, M.2
Jha, S.3
-
16
-
-
80053629393
-
Useful and useless statistics about viruses and anti-virus programs
-
M. Morgenstern and H. Pilz. Useful and useless statistics about viruses and anti-virus programs. In Proceedings of the CARO Workshop, 2010. Available online: www.f-secure.com/weblog/archives/Maik-Morgenstern-Statistics.pdf.
-
(2010)
Proceedings of the CARO Workshop
-
-
Morgenstern, M.1
Pilz, H.2
-
17
-
-
79958242266
-
Collective classification for text classification
-
G. Namata, P. Sen, M. Bilgic, and L. Getoor. Collective classification for text classification. Text Mining, pages 51-69, 2009.
-
(2009)
Text Mining
, pp. 51-69
-
-
Namata, G.1
Sen, P.2
Bilgic, M.3
Getoor, L.4
-
19
-
-
80053647027
-
-
PEiD. PEiD webpage, 2010. Available online: http://www.peid.info/.
-
(2010)
PEiD Webpage
-
-
-
20
-
-
50149118846
-
Classification of packed executables for accurate computer virus detection
-
R. Perdisci, A. Lanzi, and W. Lee. Classification of packed executables for accurate computer virus detection. Pattern Recognition Letters, 29(14):1941-1946, 2008.
-
(2008)
Pattern Recognition Letters
, vol.29
, Issue.14
, pp. 1941-1946
-
-
Perdisci, R.1
Lanzi, A.2
Lee, W.3
-
23
-
-
34748820878
-
Polyunpack: Automating the hidden-code extraction of unpack-executing malware
-
P. Royal, M. Halpin, D. Dagon, R. Edmonds, and W. Lee. Polyunpack: Automating the hidden-code extraction of unpack-executing malware. In Proceedings of the 2006 Annual Computer Security Applications Conference (ACSAC), pages 289-300, 2006.
-
(2006)
Proceedings of the 2006 Annual Computer Security Applications Conference (ACSAC)
, pp. 289-300
-
-
Royal, P.1
Halpin, M.2
Dagon, D.3
Edmonds, R.4
Lee, W.5
-
24
-
-
77949503891
-
Idea: Opcode-sequence-based malware detection
-
volume 5965 of LNCS. 10.1007/978-3-642-11747-3 3
-
I. Santos, F. Brezo, J. Nieves, Y. Penya, B. Sanz, C. Laorden, and P. Bringas. Idea: Opcode-sequence-based malware detection. In Engineering Secure Software and Systems, volume 5965 of LNCS, pages 35-43. 2010. 10.1007/978-3-642-11747-3 3.
-
(2010)
Engineering Secure Software and Systems
, pp. 35-43
-
-
Santos, I.1
Brezo, F.2
Nieves, J.3
Penya, Y.4
Sanz, B.5
Laorden, C.6
Bringas, P.7
-
25
-
-
79958243228
-
PE-Probe: Leveraging packer detection and structural information to detect malicious portable executables
-
M. Shafiq, S. Tabish, and M. Farooq. PE-Probe: Leveraging Packer Detection and Structural Information to Detect Malicious Portable Executables. In Proceedings of the Virus Bulletin Conference (VB), 2009.
-
(2009)
Proceedings of the Virus Bulletin Conference (VB)
-
-
Shafiq, M.1
Tabish, S.2
Farooq, M.3
-
28
-
-
67650330214
-
Comparative analysis of regression and machine learning methods for predicting fault proneness models
-
Y. Singh, A. Kaur, and R. Malhotra. Comparative analysis of regression and machine learning methods for predicting fault proneness models. International Journal of Computer Applications in Technology, 35(2):183-193, 2009.
-
(2009)
International Journal of Computer Applications in Technology
, vol.35
, Issue.2
, pp. 183-193
-
-
Singh, Y.1
Kaur, A.2
Malhotra, R.3
-
32
-
-
80053629561
-
-
VX Heavens. Available online: http://vx.netlux.org/.
-
VX Heavens
-
-
-
33
-
-
78249270609
-
-
Technical report, Technical Report SRI-CSL-08-01
-
V. Yegneswaran, H. Saidi, P. Porras, M. Sharif, and W. Mark. Eureka: A framework for enabling static analysis on malware. Technical report, Technical Report SRI-CSL-08-01, 2008.
-
(2008)
Eureka: A Framework for Enabling Static Analysis on Malware
-
-
Yegneswaran, V.1
Saidi, H.2
Porras, P.3
Sharif, M.4
Mark, W.5
|