-
1
-
-
57449100163
-
The probabilistic program dependence graph and its application to fault diagnosis
-
New York, NY, USA, ACM
-
G. K. Baah, A. Podgurski, and M. J. Harrold. The probabilistic program dependence graph and its application to fault diagnosis. In Proceedings of the 2008 international symposium on Software testing and analysis, ISSTA'08, pages 189-200, New York, NY, USA, 2008. ACM.
-
(2008)
Proceedings of the 2008 International Symposium on Software Testing and Analysis, ISSTA'08
, pp. 189-200
-
-
Baah, G.K.1
Podgurski, A.2
Harrold, M.J.3
-
2
-
-
55649089217
-
Automated containment of rootkits attacks
-
A. Baliga, L. Iftode, and X. Chen. Automated containment of rootkits attacks. Computers & Security, 27(7-8):323-334, 2008.
-
(2008)
Computers & Security
, vol.27
, Issue.7-8
, pp. 323-334
-
-
Baliga, A.1
Iftode, L.2
Chen, X.3
-
5
-
-
77954476208
-
-
Trend Micro
-
M. Cruz. Most abused infection vector, 2008. Trend Micro. http://blog. trendmicro.com/most-abused-infection-vector/.
-
(2008)
Most Abused Infection Vector
-
-
Cruz, M.1
-
12
-
-
60349104471
-
Alcatraz: An isolated environment for experimenting with untrusted software
-
January
-
Z. Liang, W. Sun, V. N. Venkatakrishnan, and R. Sekar. Alcatraz: An isolated environment for experimenting with untrusted software. ACM Trans. Inf. Syst. Secur., 12:14:1-14:37, January 2009.
-
(2009)
ACM Trans. Inf. Syst. Secur.
, vol.12
, pp. 141-1437
-
-
Liang, Z.1
Sun, W.2
Venkatakrishnan, V.N.3
Sekar, R.4
-
14
-
-
48349087157
-
Enhancing web browser security against malware extensions
-
M. T. Louw, J. S. Lim, and V. N. Venkatakrishnan. Enhancing web browser security against malware extensions. Journal in Computer Virology, 4(3):179-195, 2008.
-
(2008)
Journal in Computer Virology
, vol.4
, Issue.3
, pp. 179-195
-
-
Louw, M.T.1
Lim, J.S.2
Venkatakrishnan, V.N.3
-
16
-
-
81055156354
-
-
www.malwaredomainlist.com.
-
-
-
-
17
-
-
81055129346
-
-
www.malwareurl.com.
-
-
-
-
18
-
-
78649303220
-
Symptomsbased detection of bot processes
-
I. V. Kotenko and V. A. Skormin, editors, Springer
-
J. A. Morales, E. J. Kartaltepe, S. Xu, and R. S. Sandhu. Symptomsbased detection of bot processes. In I. V. Kotenko and V. A. Skormin, editors, MMM-ACNS, volume 6258 of Lecture Notes in Computer Science, pages 229-241. Springer, 2010.
-
(2010)
MMM-ACNS, Volume 6258 of Lecture Notes in Computer Science
, pp. 229-241
-
-
Morales, J.A.1
Kartaltepe, E.J.2
Xu, S.3
Sandhu, R.S.4
-
21
-
-
85080711655
-
The ghost in the browser analysis of web-based malware
-
Berkeley, CA, USA, USENIX Associa-tion
-
N. Provos, D. McNamee, P. Mavrommatis, K. Wang, and N. Modadugu. The ghost in the browser analysis of web-based malware. In HotBots'07: Proceedings of the first conference on First Workshop on Hot Topics in Understanding Botnets, Berkeley, CA, USA, 2007. USENIX Associa-tion
-
(2007)
HotBots'07: Proceedings of the First Conference on First Workshop on Hot Topics in Understanding Botnets
-
-
Provos, N.1
McNamee, D.2
Mavrommatis, P.3
Wang, K.4
Modadugu, N.5
-
23
-
-
78751553658
-
Cujo: Efficient detection and prevention of drive-by-download attacks
-
ACSAC'10, New York, NY, USA, ACM
-
K. Rieck, T. Krueger, and A. Dewald. Cujo: efficient detection and prevention of drive-by-download attacks. In Proceedings of the 26th Annual Computer Security Applications Conference, ACSAC'10, pages 31-39, New York, NY, USA, 2010. ACM.
-
(2010)
Proceedings of the 26th Annual Computer Security Applications Conference
, pp. 31-39
-
-
Rieck, K.1
Krueger, T.2
Dewald, A.3
-
24
-
-
77954740531
-
Botzilla: Detecting the "phoning home" of malicious software
-
SAC'10, New York, NY, USA, ACM
-
K. Rieck, G. Schwenk, T. Limmer, T. Holz, and P. Laskov. Botzilla: detecting the "phoning home" of malicious software. In Proceedings of the 2010 ACM Symposium on Applied Computing, SAC'10, pages 1978-1984, New York, NY, USA, 2010. ACM.
-
(2010)
Proceedings of the 2010 ACM Symposium on Applied Computing
, pp. 1978-1984
-
-
Rieck, K.1
Schwenk, G.2
Limmer, T.3
Holz, T.4
Laskov, P.5
-
25
-
-
81055129342
-
The user is not the enemy: Fighting malware by tracking user intentions
-
September
-
J. Shirley and D. Evans. The user is not the enemy: Fighting malware by tracking user intentions. In Proceedings of New Security Paradigms Workshop (NSPW), pages 22-25, September 2008.
-
(2008)
Proceedings of New Security Paradigms Workshop (NSPW)
, pp. 22-25
-
-
Shirley, J.1
Evans, D.2
-
26
-
-
78751553661
-
-
skape. Understanding windows shellcode. http://www.nologin.org/Downloads/ Papers/win32-shellcode.pdf, 2003.
-
(2003)
Understanding Windows Shellcode
-
-
-
27
-
-
84883368527
-
-
skape. Metasploit's meterpreter. http://www.nologin.org/Downloads/Papers/ meterpreter.pdf, 2004.
-
(2004)
Metasploit's Meterpreter
-
-
-
29
-
-
77954497121
-
Preventing drive-by download via inter-module communication monitoring
-
C. Song, J. Zhuge, X. Han, and Z. Ye. Preventing drive-by download via inter-module communication monitoring. In Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security (ASIACCS), 2010.
-
(2010)
Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security (ASIACCS)
-
-
Song, C.1
Zhuge, J.2
Han, X.3
Ye, Z.4
-
31
-
-
70350432796
-
Automated spyware collection and analysis
-
P. Samarati, M. Yung, F. Martinelli, and C. A. Ardagna, editors, Springer
-
A. Stamminger, C. Kruegel, G. Vigna, and E. Kirda. Automated spyware collection and analysis. In P. Samarati, M. Yung, F. Martinelli, and C. A. Ardagna, editors, ISC, volume 5735 of Lecture Notes in Computer Science, pages 202-217. Springer, 2009.
-
(2009)
ISC, Volume 5735 of Lecture Notes in Computer Science
, pp. 202-217
-
-
Stamminger, A.1
Kruegel, C.2
Vigna, G.3
Kirda, E.4
-
33
-
-
74049154670
-
Your botnet is my botnet: Analysis of a botnet takeover
-
E. Al-Shaer, S. Jha, and A. D. Keromytis, editors, ACM
-
B. Stone-Gross, M. Cova, L. Cavallaro, B. Gilbert, M. Szydlowski, R. A. Kemmerer, C. Kruegel, and G. Vigna. Your botnet is my botnet: analysis of a botnet takeover. In E. Al-Shaer, S. Jha, and A. D. Keromytis, editors, ACM Conference on Computer and Communications Security, pages 635-647. ACM, 2009.
-
(2009)
ACM Conference on Computer and Communications Security
, pp. 635-647
-
-
Stone-Gross, B.1
Cova, M.2
Cavallaro, L.3
Gilbert, B.4
Szydlowski, M.5
Kemmerer, R.A.6
Kruegel, C.7
Vigna, G.8
-
34
-
-
49949083293
-
Expanding malware defense by securing software installations
-
Berlin, Heidelberg, Springer-Verlag
-
W. Sun, R. Sekar, Z. Liang, and V. N. Venkatakrishnan. Expanding malware defense by securing software installations. In Proceedings of the 5th international conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA'08, pages 164-185, Berlin, Heidelberg, 2008. Springer-Verlag.
-
(2008)
Proceedings of the 5th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA'08
, pp. 164-185
-
-
Sun, W.1
Sekar, R.2
Liang, Z.3
Venkatakrishnan, V.N.4
-
35
-
-
70450040454
-
Protection and communication abstractions for web browsers in MashupOS
-
ACM Press
-
H. J. Wang, X. Fan, J. Howell, and C. Jackson. Protection and communication abstractions for web browsers in MashupOS. In ACM Symposium on Operating Systems Principle (SOSP), pages 1-16. ACM Press, 2007.
-
(2007)
ACM Symposium on Operating Systems Principle (SOSP)
, pp. 1-16
-
-
Wang, H.J.1
Fan, X.2
Howell, J.3
Jackson, C.4
-
36
-
-
77954608267
-
The multi-principal OS construction of the Gazelle web browser
-
August
-
H. J. Wang, C. Grier, A. Moshchuk, S. T. King, P. Choudhury, and H. Venter. The multi-principal OS construction of the Gazelle web browser. In Proceedings of the 18th Usenix Security Symposium, August 2009.
-
(2009)
Proceedings of the 18th Usenix Security Symposium
-
-
Wang, H.J.1
Grier, C.2
Moshchuk, A.3
King, S.T.4
Choudhury, P.5
Venter, H.6
-
37
-
-
84904088330
-
Automated web patrol with Strider HoneyMonkeys: Finding web sites that exploit browser vulnerabilities
-
Y.-M. Wang, D. Beck, X. Jiang, R. Roussev, C. Verbowski, S. Chen, and S. King. Automated web patrol with Strider HoneyMonkeys: Finding web sites that exploit browser vulnerabilities. In Proceedings of the Annual Symposium on Network and Distributed System Security (NDSS), 2006.
-
(2006)
Proceedings of the Annual Symposium on Network and Distributed System Security (NDSS)
-
-
Wang, Y.-M.1
Beck, D.2
Jiang, X.3
Roussev, R.4
Verbowski, C.5
Chen, S.6
King, S.7
-
38
-
-
76549113940
-
User-assisted host-based detection of outbound malware traffic
-
December
-
H. Xiong, P. Malhotra, D. Stefan, C. Wu, and D. Yao. User-assisted host-based detection of outbound malware traffic. In Proceedings of International Conference on Information and Communications Security (ICICS), December 2009.
-
(2009)
Proceedings of International Conference on Information and Communications Security (ICICS)
-
-
Xiong, H.1
Malhotra, P.2
Stefan, D.3
Wu, C.4
Yao, D.5
|