-
2
-
-
80755188399
-
-
http://anubis.iseclab.org, 2010.
-
(2010)
-
-
-
3
-
-
80755188401
-
-
http://www.cwsandbox.org, 2010.
-
(2010)
-
-
-
4
-
-
80755174271
-
-
http://www.norman.com/enterprise/all-products/malware-analyzer/ norman-sandbox-analyzer/en, 2010.
-
(2010)
-
-
-
5
-
-
80755188400
-
-
http://msdn.microsoft.com/en-us/library/ms724408%28VS.85%29.aspx, 2010.
-
(2010)
-
-
-
6
-
-
84872113696
-
Efficient detection of split personalities in malware
-
BALZAROTTI, D., COVA, M., KARLBERGER, C., KRUEGEL, C., KIRDA, E., AND VIGNA, G. Efficient Detection of Split Personalities in Malware. In Network and Distributed System Security Symposium (NDSS) (2010).
-
(2010)
Network and Distributed System Security Symposium (NDSS)
-
-
Balzarotti, D.1
Cova, M.2
Karlberger, C.3
Kruegel, C.4
Kirda, E.5
Vigna, G.6
-
7
-
-
85084096603
-
A view on current malware behaviors
-
BAYER, U., HABIBI, I., BALZAROTTI, D., KIRDA, E., AND KRUEGEL, C. A View on Current Malware Behaviors. In Workshop on Large-Scale Exploits and Emergent Threats (LEET) (2009).
-
(2009)
Workshop on Large-scale Exploits and Emergent Threats (LEET)
-
-
Bayer, U.1
Habibi, I.2
Balzarotti, D.3
Kirda, E.4
Kruegel, C.5
-
8
-
-
80755144125
-
Scalable, behavior-based malware clustering
-
BAYER, U., MILANI COMPARETTI, P., HLAUSCHEK, C., KRUEGEL, C., AND KIRDA, E. Scalable, Behavior-Based Malware Clustering. In Network and Distributed System Security Symposium (2009).
-
(2009)
Network and Distributed System Security Symposium
-
-
Bayer, U.1
Milani Comparetti, P.2
Hlauschek, C.3
Kruegel, C.4
Kirda, E.5
-
9
-
-
34548772699
-
Towards automatically identifying trigger-based behavior in malware using symbolic execution and binary analysis
-
BRUMLEY, D., HARTWIG, C., LIANG, Z., NEWSOME, J., SONG, D., AND YIN, H. Towards automatically identifying trigger-based behavior in malware using symbolic execution and binary analysis. Tech. Rep. CMU-CS-07-105, Carnegie Mellon University, 2007.
-
(2007)
Tech. Rep. CMU-CS-07-105, Carnegie Mellon University
-
-
Brumley, D.1
Hartwig, C.2
Liang, Z.3
Newsome, J.4
Song, D.5
Yin, H.6
-
10
-
-
34547478273
-
Temporal search: Detecting hidden malware timebombs with virtual machines
-
CRANDALL, J., WASSERMANN, G., DE OLIVEIRA, D., SU, Z., WU, F., AND CHONG, F. Temporal Search: Detecting Hidden Malware Timebombs with Virtual Machines. In Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS) (2006).
-
(2006)
Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS)
-
-
Crandall, J.1
Wassermann, G.2
De Oliveira, D.3
Su, Z.4
Wu, F.5
Chong, F.6
-
11
-
-
70349240080
-
Ether: Malware analysis via hardware virtualization extensions
-
DINABURG, A., ROYAL, P., SHARIF, M., AND LEE, W. Ether: Malware Analysis via Hardware Virtualization Extensions. In ACM Conference on Computer and Communications Security (2008).
-
(2008)
ACM Conference on Computer and Communications Security
-
-
Dinaburg, A.1
Royal, P.2
Sharif, M.3
Lee, W.4
-
12
-
-
78649799019
-
Dynamic and transparent analysis of commodity production systems
-
FATTORI, A., PALEARI, R., MARTIGNONI, L., AND MONGA, M. Dynamic and Transparent Analysis of Commodity Production Systems. In International Conference on Automated Software Engineering (ASE) (2010).
-
(2010)
International Conference on Automated Software Engineering (ASE)
-
-
Fattori, A.1
Paleari, R.2
Martignoni, L.3
Monga, M.4
-
14
-
-
77955210614
-
Synthesizing near-optimal malware specifications from suspicious behaviors
-
FREDRIKSON, M., JHA, S., CHRISTODORESCU, M., SAILER, R., AND YAN, X. Synthesizing Near-Optimal Malware Specifications from Suspicious Behaviors. In IEEE Symposium on Security and Privacy (2010).
-
(2010)
IEEE Symposium on Security and Privacy
-
-
Fredrikson, M.1
Jha, S.2
Christodorescu, M.3
Sailer, R.4
Yan, X.5
-
16
-
-
85076932663
-
Studying spamming botnets using botlab
-
JOHN, J., MOSHCHUK, A., GRIBBLE, S., AND KRISHNAMURTHY, A. Studying Spamming Botnets Using Botlab. In Usenix Symposium on Networked Systems Design and Implementation (NSDI) (2009).
-
(2009)
Usenix Symposium on Networked Systems Design and Implementation (NSDI)
-
-
John, J.1
Moshchuk, A.2
Gribble, S.3
Krishnamurthy, A.4
-
17
-
-
80755188398
-
Emulating emulation-resistant malware
-
KANG, M., YIN, H., HANNA, S., MCCAMANT, S., AND SONG, D. Emulating Emulation-Resistant Malware. In Workshop on Virtual Machine Security (VMSec) (2010).
-
(2010)
Workshop on Virtual Machine Security (VMSec)
-
-
Kang, M.1
Yin, H.2
Hanna, S.3
Mccamant, S.4
Song, D.5
-
18
-
-
77955195701
-
Inspector gadget: Automated extraction of proprietary gadgets from malware binaries
-
KOLBITSCH, C., HOLZ, T., KRUEGEL, C., AND KIRDA, E. Inspector Gadget: Automated Extraction of Proprietary Gadgets from Malware Binaries. In IEEE Symposium on Security and Privacy (2010).
-
(2010)
IEEE Symposium on Security and Privacy
-
-
Kolbitsch, C.1
Holz, T.2
Kruegel, C.3
Kirda, E.4
-
19
-
-
85076206522
-
Effective and efficient malware detection at the end host
-
KOLBITSCH, C., MILANI COMPARETTI, P., KRUEGEL, C., KIRDA, E., ZHOU, X., AND WANG, X. Effective and Efficient Malware Detection at the End Host. In Usenix Security Symposium (2009).
-
(2009)
Usenix Security Symposium
-
-
Kolbitsch, C.1
Milani Comparetti, P.2
Kruegel, C.3
Kirda, E.4
Zhou, X.5
Wang, X.6
-
20
-
-
85008257023
-
Testing CPU emulators
-
MARTIGNONI, L., PALEARI, R., ROGLIA, G. F., AND BRUSCHI, D. Testing CPU Emulators. In International Symposium on Software Testing and Analysis (ISSTA) (2009).
-
(2009)
International Symposium on Software Testing and Analysis (ISSTA)
-
-
Martignoni, L.1
Paleari, R.2
Roglia, G.F.3
Bruschi, D.4
-
22
-
-
85084163236
-
A fistful of red-pills: How to automatically generate procedures to detect CPU emulators
-
PALEARI, R., MARTIGNONI, L., ROGLIA, G. F., AND BRUSCHI, D. A Fistful of Red-Pills: How to Automatically Generate Procedures to Detect CPU Emulators. In usenix-woot (2009).
-
(2009)
Usenix-woot
-
-
Paleari, R.1
Martignoni, L.2
Roglia, G.F.3
Bruschi, D.4
-
25
-
-
70449684394
-
BitBlaze: A new approach to computer security via binary analysis
-
SONG, D., BRUMLEY, D., YIN, H., CABALLERO, J., JAGER, I., KANG, M. G., LIANG, Z., NEWSOME, J., POOSANKAM, P., AND SAXENA, P. BitBlaze: A new approach to computer security via binary analysis. In Conference on Information Systems Security (Invited Paper) (2008).
-
(2008)
Conference on Information Systems Security (Invited Paper)
-
-
Song, D.1
Brumley, D.2
Yin, H.3
Caballero, J.4
Jager, I.5
Kang, M.G.6
Liang, Z.7
Newsome, J.8
Poosankam, P.9
Saxena, P.10
-
27
-
-
74049154670
-
Your botnet is my botnet: Analysis of a botnet takeover
-
STONE-GROSS, B., COVA, M., CAVALLARO, L., GILBERT, B., SZYDLOWSKI, M., KEMMERER, R., KRUEGEL, C., AND VIGNA, G. Your Botnet is My Botnet: Analysis of a Botnet Takeover. In ACM Conference on Computer and Communications Security (CCS) (2009).
-
(2009)
ACM Conference on Computer and Communications Security (CCS)
-
-
Stone-Gross, B.1
Cova, M.2
Cavallaro, L.3
Gilbert, B.4
Szydlowski, M.5
Kemmerer, R.6
Kruegel, C.7
Vigna, G.8
|