-
1
-
-
80255131692
-
-
Accessed 5 August
-
Aspack software. http://www. aspack. com/asprotect. html, Accessed 5 August 2010.
-
(2010)
Aspack software
-
-
-
2
-
-
14344252374
-
Multiple kernel learning, conic duality, and the smo algorithm
-
ACM, New York
-
Bach, F. R., Lanckriet, G. R. G., Jordan, M. I.: Multiple kernel learning, conic duality, and the smo algorithm. In: Proceedings of the Twenty-First International Conference on Machine Learning, ICML'04, p. 6. ACM, New York (2004).
-
(2004)
Proceedings of the Twenty-First International Conference on Machine Learning, ICML'04
, pp. 6
-
-
Bach, F.R.1
Lanckriet, G.R.G.2
Jordan, M.I.3
-
5
-
-
33746406796
-
Detecting self-mutating malware using control-flow graph matching
-
In: Bschkes, R., Laskov, P. (eds.) Springer, Berlin
-
Bruschi, D., Martignoni, L., Monga, M.: Detecting self-mutating malware using control-flow graph matching. In: Bschkes, R., Laskov, P. (eds.) Detection of Intrusions and Malware and Vulnerability Assessment. Lecture Notes in Computer Science, vol. 4064, pp. 129-143. Springer, Berlin (2006).
-
(2006)
Detection of Intrusions and Malware and Vulnerability Assessment. Lecture Notes in Computer Science
, vol.4064
, pp. 129-143
-
-
Bruschi, D.1
Martignoni, L.2
Monga, M.3
-
6
-
-
27144489164
-
A tutorial on support vector machines for pattern recognition
-
Burges C. J. C.: A tutorial on support vector machines for pattern recognition. Data Min. Knowl. Discov. 2, 121-167 (1998).
-
(1998)
Data Min. Knowl. Discov.
, vol.2
, pp. 121-167
-
-
Burges, C.J.C.1
-
7
-
-
0002500236
-
Improving minority class prediction using case-specific feature weights
-
Morgan Kaufmann Publishers Inc, San Francisco
-
Cardie, C., Nowe, N.: Improving minority class prediction using case-specific feature weights. In: Proceedings of the Fourteenth International Conference on Machine Learning, ICML'97, pp. 57-65. Morgan Kaufmann Publishers Inc, San Francisco (1997).
-
(1997)
Proceedings of the Fourteenth International Conference on Machine Learning, ICML'97
, pp. 57-65
-
-
Cardie, C.1
Nowe, N.2
-
8
-
-
84869003423
-
Classification of malware using structured control flow
-
AusPDC '10 Australian Computer Society Inc, Darlinghurst
-
Cesare, S., Xiang, Y.: Classification of malware using structured control flow. In: Proceedings of the Eighth Australasian Symposium on Parallel and Distributed Computing, vol. 107, AusPDC '10, pp. 61-70. Australian Computer Society Inc, Darlinghurst (2010).
-
(2010)
Proceedings of the Eighth Australasian Symposium on Parallel and Distributed Computing
, vol.107
, pp. 61-70
-
-
Cesare, S.1
Xiang, Y.2
-
11
-
-
77952602657
-
Efficient virus detection using dynamic instruction sequences
-
Dai J., Guha R., Lee J.: Efficient virus detection using dynamic instruction sequences. J. Comput. 4(5), 405-414 (2009).
-
(2009)
J. Comput.
, vol.4
, Issue.5
, pp. 405-414
-
-
Dai, J.1
Guha, R.2
Lee, J.3
-
12
-
-
70349240080
-
Ether: malware analysis via hardware virtualization extensions
-
ACM, New York
-
Dinaburg, A., Royal, P., Sharif, M., Lee, W.: Ether: malware analysis via hardware virtualization extensions. In: Proceedings of the 15th ACM conference on Computer and communications security, CCS '08, pp. 51-62. ACM, New York (2008).
-
(2008)
Proceedings of the 15th ACM conference on Computer and communications security, CCS '08
, pp. 51-62
-
-
Dinaburg, A.1
Royal, P.2
Sharif, M.3
Lee, W.4
-
14
-
-
0001710505
-
Analysis of a complex of statistical variables into principal components
-
Hotelling H.: Analysis of a complex of statistical variables into principal components. J. Educ. Psychol. 24(6), 417-441 (1933).
-
(1933)
J. Educ. Psychol.
, vol.24
, Issue.6
, pp. 417-441
-
-
Hotelling, H.1
-
15
-
-
74049142314
-
Large-scale malware indexing using function-call graphs
-
ACM, New York
-
Hu, X., Chiueh, T.-c., Shin, K. G.: Large-scale malware indexing using function-call graphs. In: Proceedings of the 16th ACM Conference on Computer and Communications Security, CCS'09, pp. 611-620. ACM, New York (2009).
-
(2009)
Proceedings of the 16th ACM Conference on Computer and Communications Security, CCS'09
, pp. 611-620
-
-
Hu, X.1
Chiueh, T.-C.2
Shin, K.G.3
-
16
-
-
80255141493
-
Rsvm: reduced support vector machines
-
Lee, Y. J., Mangasarian, O. L.: Rsvm: reduced support vector machines. In: Data Mining Institute, Computer Sciences Department, University of Wisconsin, pp. 00-07 (2001).
-
(2001)
Data Mining Institute, Computer Sciences Department, University of Wisconsin
, pp. 00-07
-
-
Lee, Y.J.1
Mangasarian, O.L.2
-
17
-
-
33746882464
-
Malware phylogeny generation using permutations of code
-
Karim Md, Walenstein A., Lakhotia A., Parida L.: Malware phylogeny generation using permutations of code. J. Comput. Virol. 1, 13-23 (2005).
-
(2005)
J. Comput. Virol.
, vol.1
, pp. 13-23
-
-
Karim, M.1
Walenstein, A.2
Lakhotia, A.3
Parida, L.4
-
20
-
-
33745670395
-
Polymorphic worm detection using structural information of executables
-
In: Valdes, A., Zamboni, D. (eds.) Springer, Berlin
-
Kruegel, C., Kirda, E., Mutz, D., Robertson, W., Vigna, G.: Polymorphic worm detection using structural information of executables. In: Valdes, A., Zamboni, D. (eds.) Recent Advances in Intrusion Detection. Lecture Notes in Computer Science, vol. 3858, pp. 207-226. Springer, Berlin (2006).
-
(2006)
Recent Advances in Intrusion Detection. Lecture Notes in Computer Science
, vol.3858
, pp. 207-226
-
-
Kruegel, C.1
Kirda, E.2
Mutz, D.3
Robertson, W.4
Vigna, G.5
-
21
-
-
80255141494
-
-
November
-
Lawton, K., Denney, B., Guarneri, N. D., Ruppert, V., Bothamy, C.: Bochs user manual. Online user manual, November 2010.
-
(2010)
Bochs user manual. Online user manual
-
-
Lawton, K.1
Denney, B.2
Guarneri, N.D.3
Ruppert, V.4
Bothamy, C.5
-
22
-
-
34548583274
-
A tutorial on spectral clustering
-
Luxburg U.: A tutorial on spectral clustering. Stat. Comput. 17(4), 395-416 (2007).
-
(2007)
Stat. Comput.
, vol.17
, Issue.4
, pp. 395-416
-
-
Luxburg, U.1
-
23
-
-
80255123027
-
-
ms680345 October
-
Microsoft, Inc. IsDebuggerPresent function. http://msdn. microsoft. com/en-us/library/ms680345(VS. 85). aspx, October 2010.
-
(2010)
IsDebuggerPresent function
-
-
-
24
-
-
80255128582
-
Malicious software (malware): A security threat to the internet economy
-
Organisation for Economic Co-operation and Development June
-
Organisation for Economic Co-operation and Development. Malicious software (malware): A security threat to the internet economy. White Paper, June 2008.
-
(2008)
White Paper
-
-
-
25
-
-
80255123024
-
Panda labs annual report 2009
-
Panda Security January
-
Panda Security. Panda labs annual report 2009. White Paper, January 2010.
-
(2010)
White Paper
-
-
-
26
-
-
79955074151
-
Improving antivirus accuracy with hypervisor assisted analysis
-
doi: 10.1007/s11416-010-0142-4
-
Quist, D., Liebrock, L., Neil, J.: Improving antivirus accuracy with hypervisor assisted analysis. J. Comput. Virol 1-11 (2010). doi: 10. 1007/s11416-010-0142-4.
-
(2010)
J. Comput. Virol
, pp. 1-11
-
-
Quist, D.1
Liebrock, L.2
Neil, J.3
-
27
-
-
57749204679
-
New malicious code detection using variable length n-grams
-
Springer, Berlin
-
Reddy, D., Dash, S., Pujari, A.: New malicious code detection using variable length n-grams. In: Information Systems Security. Lecture Notes in Computer Science, vol. 4332, pp. 276-288. Springer, Berlin (2006).
-
(2006)
Information Systems Security. Lecture Notes in Computer Science
, vol.4332
, pp. 276-288
-
-
Reddy, D.1
Dash, S.2
Pujari, A.3
-
28
-
-
33751168025
-
N-gram analysis for computer virus detection
-
Reddy D., Pujari A.: N-gram analysis for computer virus detection. J. Comput. Virol. 2, 231-239 (2006).
-
(2006)
J. Comput. Virol.
, vol.2
, pp. 231-239
-
-
Reddy, D.1
Pujari, A.2
-
29
-
-
49949090311
-
Learning and classification of malware behavior
-
In: Zamboni, D. (ed) Springer, Berlin
-
Rieck, K., Holz, T., Willems, C., Dssel, P., Laskov, P.: Learning and classification of malware behavior. In: Zamboni, D. (ed) Detection of Intrusions and Malware, and Vulnerability Assessment. Lecture Notes in Computer Science, vol. 5137, pp. 108-125. Springer, Berlin (2008).
-
(2008)
Detection of Intrusions and Malware, and Vulnerability Assessment. Lecture Notes in Computer Science
, vol.5137
, pp. 108-125
-
-
Rieck, K.1
Holz, T.2
Willems, C.3
Dssel, P.4
Laskov, P.5
-
32
-
-
49949094798
-
Embedded malware detection using markov n-grams
-
Springer, Berlin
-
Shafiq, M., Khayam, S., Farooq, M.: Embedded malware detection using markov n-grams. In: Detection of Intrusions and Malware, and Vulnerability Assessment. Lecture Notes in Computer Science, vol. 5137, pp. 88-107. Springer, Berlin (2008).
-
(2008)
Detection of Intrusions and Malware, and Vulnerability Assessment. Lecture Notes in Computer Science
, vol.5137
, pp. 88-107
-
-
Shafiq, M.1
Khayam, S.2
Farooq, M.3
-
33
-
-
79955114244
-
Malware detection using assembly and api call sequences
-
doi: 10.1007/s11416-010-0141-5
-
Shankarapani, M., Ramamoorthy, S., Movva, R., Mukkamala, S.: Malware detection using assembly and api call sequences. J. Comput. Virol. pp. 1-13 (2010). doi: 10. 1007/s11416-010-0141-5.
-
(2010)
J. Comput. Virol.
, pp. 1-13
-
-
Shankarapani, M.1
Ramamoorthy, S.2
Movva, R.3
Mukkamala, S.4
-
34
-
-
80255123025
-
-
RDGMax Software Software package, November
-
RDGMax Software. RDG Tejon Crypter. Software package, November 2010.
-
(2010)
RDG Tejon Crypter
-
-
-
36
-
-
84882697421
-
Towards stealthy malware detection
-
Springer, Berlin
-
Stolfo, S., Wang, K., Li, W. J.: Towards stealthy malware detection. In: Malware Detection. Advances in Information Security, vol. 27, pp. 231-249. Springer, Berlin (2007).
-
(2007)
Malware Detection. Advances in Information Security
, vol.27
, pp. 231-249
-
-
Stolfo, S.1
Wang, K.2
Li, W.J.3
-
37
-
-
77950169386
-
Malware analysis with graph kernels and support vector machines
-
Wagner, C., Wagener, G., State, R., Engel, T.: Malware analysis with graph kernels and support vector machines. In: Malicious and Unwanted Software (MALWARE), 2009 4th International Conference, pp. 63-68 (2009).
-
(2009)
Malicious and Unwanted Software (MALWARE), 2009 4th International Conference
, pp. 63-68
-
-
Wagner, C.1
Wagener, G.2
State, R.3
Engel, T.4
-
38
-
-
71949126695
-
-
Walenstein, A., Venable, M., Hayes, M., Thompson, C., Lakhotia, A.: Exploiting similarity between variants to defeat malware (2008).
-
(2008)
Exploiting similarity between variants to defeat malware
-
-
Walenstein, A.1
Venable, M.2
Hayes, M.3
Thompson, C.4
Lakhotia, A.5
-
39
-
-
36849096063
-
Imds: Intelligent malware detection system
-
Li, T., Ye, Y., Wang, D., Ye, D.: Imds: Intelligent malware detection system. In: Proceedings of the 13th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (2007).
-
(2007)
Proceedings of the 13th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining
-
-
Li, T.1
Ye, Y.2
Wang, D.3
Ye, D.4
|