-
2
-
-
38149089416
-
Automated classification and analysis of internet malware
-
Springer, Berlin
-
Bailey, M., Oberheide, J., Andersen, J., Mao, Z. M., Jahanian, F., Nazario, J.: Automated classification and analysis of internet malware. In: Proceedings of the 10th international conference on Recent advances in intrusion detection, pp. 178-197. Springer, Berlin (2007).
-
(2007)
Proceedings of the 10th international conference on Recent advances in intrusion detection
, pp. 178-197
-
-
Bailey, M.1
Oberheide, J.2
Andersen, J.3
Mao, Z.M.4
Jahanian, F.5
Nazario, J.6
-
3
-
-
80051684590
-
-
Ph. D. dissertation, Technischen Universität Wien, December
-
Bayer, U.: Large-scale dynamic malware analysis. Ph. D. dissertation, Technischen Universität Wien, December 2009.
-
(2009)
Large-scale dynamic malware analysis
-
-
Bayer, U.1
-
4
-
-
77955038057
-
Scalable, Behavior-Based Malware Clustering
-
Bayer, U., Comparetti, P. M., Hlauschek, C., Kruegel, C., Kirda, E.: Scalable, Behavior-Based Malware Clustering. In: 16th Annual Network and Distributed System Security (2009).
-
(2009)
16th Annual Network and Distributed System Security
-
-
Bayer, U.1
Comparetti, P.M.2
Hlauschek, C.3
Kruegel, C.4
Kirda, E.5
-
5
-
-
77954701461
-
Improving the efficiency of dynamic malware analysis
-
ACM, New York. doi: 10.1145/1774088.1774484
-
Bayer, U., Kirda, E., Kruegel, C.: Improving the efficiency of dynamic malware analysis. In: Proceedings of the 2010 ACM Symposium on Applied Computing, ser. SAC '10, pp. 1871-1878. ACM, New York (2010). doi: 10. 1145/1774088. 1774484.
-
(2010)
Proceedings of the 2010 ACM Symposium on Applied Computing, ser. SAC '10
, pp. 1871-1878
-
-
Bayer, U.1
Kirda, E.2
Kruegel, C.3
-
7
-
-
48349087890
-
Code obfuscation techniques for metamorphic viruses
-
doi:10.1007/s11416-008-0084-2
-
Borello J.-M., Mé L.: Code obfuscation techniques for metamorphic viruses. J. Comput. Virol. 4, 211-220 (2008). doi: 10. 1007/s11416-008-0084-2.
-
(2008)
J. Comput. Virol.
, vol.4
, pp. 211-220
-
-
Borello, J.-M.1
Mé, L.2
-
8
-
-
80255123584
-
-
May, Retrieved on March 2010
-
Bradde, S., Braunstein, A., Mahmoudi, H., Tria, F., Weigt, M., Zecchina, R.: Aligning graphs and finding substructures by message passing, May 2009, Retrieved on March 2010. http://arxiv. org/abs/0905. 1893.
-
(2009)
Aligning graphs and finding substructures by message passing
-
-
Bradde, S.1
Braunstein, A.2
Mahmoudi, H.3
Tria, F.4
Weigt, M.5
Zecchina, R.6
-
9
-
-
77954325210
-
Graphs, entropy and grid computing: Automatic comparison of malware
-
Retrieved on May 2010
-
Briones, I., Gomez, A.: Graphs, entropy and grid computing: Automatic comparison of malware. In: Proceedings of the 2008 Virus Bulletin Conference, 2008, Retrieved on May 2010. http://www. virusbtn. com/conference/vb2008.
-
(2008)
Proceedings of the 2008 Virus Bulletin Conference
-
-
Briones, I.1
Gomez, A.2
-
11
-
-
54849432819
-
Digital genome mapping-advanced binary malware analysis
-
Retrieved on May 2010
-
Carrera, E., Erdélyi, G.: Digital genome mapping-advanced binary malware analysis. In: Virus Bulletin Conference, 2004, Retrieved on May 2010. http://www. virusbtn. com/conference/vb2004.
-
(2004)
Virus Bulletin Conference
-
-
Carrera, E.1
Erdélyi, G.2
-
13
-
-
3543138441
-
-
Ch. 10 2nd edn., London: Wiley
-
Duda R. O., Hart P. E., Stork D. G.: Pattern Classification, ch. 10, 2nd edn, pp. 517-598. Wiley, London (2000).
-
(2000)
Pattern Classification
, pp. 517-598
-
-
Duda, R.O.1
Hart, P.E.2
Stork, D.G.3
-
17
-
-
85170282443
-
A density-based algorithm for discovering clusters in large spatial databases with noise
-
AAAI Press
-
Ester, M., Kriegel, H.-P., Sander, J., Xu, X.: A density-based algorithm for discovering clusters in large spatial databases with noise. In: Proceedings of 2nd International Conference of Knowledge Discovery and Data Mining, pp. 226-231. AAAI Press (1996).
-
(1996)
Proceedings of 2nd International Conference of Knowledge Discovery and Data Mining
, pp. 226-231
-
-
Ester, M.1
Kriegel, H.-P.2
Sander, J.3
Xu, X.4
-
18
-
-
0032597935
-
A two-stage discrete optimization method for largest common subgraph problems
-
19990825
-
Funabiki, N., Kitamichi, J.: A two-stage discrete optimization method for largest common subgraph problems. In: IEICE Transactions on Information and Systems, 82(8), 1145-1153, 19990825. http://ci. nii. ac. jp/naid/110003210164/en/.
-
IEICE Transactions on Information and Systems
, vol.82
, Issue.8
, pp. 1145-1153
-
-
Funabiki, N.1
Kitamichi, J.2
-
19
-
-
45549097571
-
Image categorization: Graph edit distance+edge direction histogram
-
Gao X., Xiao B., Tao D., Li X.: Image categorization: Graph edit distance+edge direction histogram. Pattern Recognit. 41(10), 3179-3191 (2008).
-
(2008)
Pattern Recognit.
, vol.41
, Issue.10
, pp. 3179-3191
-
-
Gao, X.1
Xiao, B.2
Tao, D.3
Li, X.4
-
21
-
-
80255123585
-
Hex-rays
-
Retrieved on 12-2-2010
-
Hex-rays. The IDA Pro disassembler and debugger. http://www. hex-rays. com/idapro/. Retrieved on 12-2-2010.
-
The IDA Pro disassembler and debugger
-
-
-
23
-
-
74049142314
-
Large-scale malware indexing using function-call graphs
-
ACM In: Al-Shaer, E., Jha, S., Keromytis, A. D. (eds)
-
Hu, X., Chiueh, T., Shin, K. G.: Large-scale malware indexing using function-call graphs. In: Al-Shaer, E., Jha, S., Keromytis, A. D. (eds) ACM Conference on Computer and Communications Security, pp. 611-620. ACM (2009).
-
(2009)
ACM Conference on Computer and Communications Security
, pp. 611-620
-
-
Hu, X.1
Chiueh, T.2
Shin, K.G.3
-
24
-
-
33748193035
-
A binary linear programming formulation of the graph edit distance
-
Justice, A., Hero, D.: A binary linear programming formulation of the graph edit distance. In: IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 28, pp. 1200-1214 (2006). http://people. ee. duke. edu/~lcarin/JusticeHero. pdf.
-
(2006)
IEEE Transactions on Pattern Analysis and Machine Intelligence
, vol.28
, pp. 1200-1214
-
-
Justice, A.1
Hero, D.2
-
26
-
-
80255123580
-
-
Master's thesis, Department of Information and Computer Science, Aalto University, Finland
-
Kinable, J.: Malware Detection Through Call Graphs. Master's thesis, Department of Information and Computer Science, Aalto University, Finland (2010).
-
(2010)
Malware Detection Through Call Graphs
-
-
Kinable, J.1
-
27
-
-
79959288642
-
Improved Call Graph Comparison Using Simulated Annealing
-
SAC March 2011 (to appear)
-
Kostakis, O., Kinable, J., Mahmoudi, H., Mustonen, K.: Improved Call Graph Comparison Using Simulated Annealing. In: Proceedings of the 2011 ACM Symposium on Applied Computing (SAC 2011), March 2011 (to appear).
-
(2011)
Proceedings of the 2011 ACM Symposium on Applied Computing
-
-
Kostakis, O.1
Kinable, J.2
Mahmoudi, H.3
Mustonen, K.4
-
30
-
-
48649087530
-
Limits of static analysis for malware detection
-
doi: 10.1109/ACSAC.2007.21
-
Moser, A., Kruegel, C., Kirda, E.: Limits of static analysis for malware detection. In: Computer Security Applications Conference, 2007, pp. 421-430. doi: 10. 1109/ACSAC. 2007. 21.
-
(2007)
Computer Security Applications Conference
, pp. 421-430
-
-
Moser, A.1
Kruegel, C.2
Kirda, E.3
-
31
-
-
33749585254
-
Fast suboptimal algorithms for the computation of graph edit distance
-
Springer, Berlin
-
Neuhaus, M., Riesen, K., Bunke, H.: Fast suboptimal algorithms for the computation of graph edit distance. In: Structural, Syntactic, and Statistical Pattern Recognition. LNCS, vol. 4109/2006, pp. 163-170. Springer, Berlin (2006).
-
(2006)
Structural, Syntactic, and Statistical Pattern Recognition. LNCS
, vol.4109
, pp. 163-170
-
-
Neuhaus, M.1
Riesen, K.2
Bunke, H.3
-
33
-
-
0036663707
-
Maximum common subgraph isomorphism algorithms for the matching of chemical structures
-
Raymond J. W., Willett P.: Maximum common subgraph isomorphism algorithms for the matching of chemical structures. J. Comput. Aided Molecular Design 16, 2002 (2002).
-
(2002)
J. Comput. Aided Molecular Design
, vol.16
, pp. 2002
-
-
Raymond, J.W.1
Willett, P.2
-
34
-
-
64849091214
-
Approximate graph edit distance computation by means of bipartite graph matching
-
7th IAPR-TC15 Workshop on Graph-based Representations (GbR 2007)
-
Riesen, K., Bunke, H.: Approximate graph edit distance computation by means of bipartite graph matching. Image Vis. Comput. 27(7), 950-959, (2009). 7th IAPR-TC15 Workshop on Graph-based Representations (GbR 2007).
-
(2009)
Image Vis. Comput.
, vol.27
, Issue.7
, pp. 950-959
-
-
Riesen, K.1
Bunke, H.2
-
35
-
-
38149054971
-
Bipartite graph matching for computing the edit distance of graphs
-
doi: 10.1007/978-3-540-72903-7_1
-
Riesen, K., Neuhaus, M., Bunke, H.: Bipartite graph matching for computing the edit distance of graphs. In: Graph-Based Representations in Pattern Recognition, 2007, pp. 1-12. doi: 10. 1007/978-3-540-72903-7_1.
-
(2007)
Graph-Based Representations in Pattern Recognition
, pp. 1-12
-
-
Riesen, K.1
Neuhaus, M.2
Bunke, H.3
-
36
-
-
0023453329
-
Silhouettes: a graphical aid to the interpretation and validation of cluster analysis
-
Rousseeuw P.: Silhouettes: a graphical aid to the interpretation and validation of cluster analysis. J. Comput. Appl. Math. 20(1), 53-65 (1987).
-
(1987)
J. Comput. Appl. Math.
, vol.20
, Issue.1
, pp. 53-65
-
-
Rousseeuw, P.1
-
37
-
-
0018466659
-
Constructing the call graph of a program
-
Ryder B.: Constructing the call graph of a program. IEEE Trans. Softw. Eng. SE-5(3), 216-226 (1979).
-
(1979)
IEEE Trans. Softw. Eng.
, vol.SE-5
, Issue.3
, pp. 216-226
-
-
Ryder, B.1
-
41
-
-
33748215463
-
The determination of maximum common substructures by a genetic algorithm: Application in synthesis design and for the structural analysis of biological activity
-
Wagener M., Gasteiger J.: The determination of maximum common substructures by a genetic algorithm: Application in synthesis design and for the structural analysis of biological activity. Angewandte Chem. Int. Ed. 33, 1189-1192 (1994).
-
(1994)
Angewandte Chem. Int. Ed.
, vol.33
, pp. 1189-1192
-
-
Wagener, M.1
Gasteiger, J.2
-
42
-
-
84875656430
-
Exploiting similarity between variants to defeat malware: vilo method for comparing and searching binary programs
-
Walenstein, A., Venable, M., Hayes, M., Thompson, C., Lakhotia, A.: Exploiting similarity between variants to defeat malware: vilo method for comparing and searching binary programs. In: Proceedings of BlackHat DC 2007 (2007).
-
(2007)
Proceedings of BlackHat DC 2007
-
-
Walenstein, A.1
Venable, M.2
Hayes, M.3
Thompson, C.4
Lakhotia, A.5
-
43
-
-
34248531951
-
Multiple graph alignment for the structural analysis of protein active sites
-
Weskamp N., Hullermeier E., Kuhn D., Klebe G.: Multiple graph alignment for the structural analysis of protein active sites. IEEE/ACM Trans. Comput. Biol. Bioinform. 4(2), 310-320 (2007).
-
(2007)
IEEE/ACM Trans. Comput. Biol. Bioinform.
, vol.4
, Issue.2
, pp. 310-320
-
-
Weskamp, N.1
Hullermeier, E.2
Kuhn, D.3
Klebe, G.4
-
45
-
-
34047110218
-
Toward automated dynamic malware analysis using cwsandbox
-
Willems, C., Holz, T., Freiling, F.: Toward automated dynamic malware analysis using cwsandbox. IEEE Security Privacy 5, 32-39 (2007). http://portal. acm. org/citation. cfm?id=1262542. 1262675.
-
(2007)
IEEE Security Privacy
, vol.5
, pp. 32-39
-
-
Willems, C.1
Holz, T.2
Freiling, F.3
-
46
-
-
77954692432
-
Comparing stars: on approximating graph edit distance
-
Zeng Z., Tung A. K. H., Wang J., Feng J., Zhou L.: Comparing stars: on approximating graph edit distance. PVLDB 2(1), 25-36 (2009).
-
(2009)
Pvldb
, vol.2
, Issue.1
, pp. 25-36
-
-
Zeng, Z.1
Tung, A.K.H.2
Wang, J.3
Feng, J.4
Zhou, L.5
|