-
1
-
-
81255197872
-
-
Information Technology Security Report Lead Agency Publication R2-002
-
Information Technology Security Report Lead Agency Publication R2-002, Future Trends in Malicious Code - 2006 Report.
-
Future Trends in Malicious Code - 2006 Report
-
-
-
2
-
-
81255211620
-
-
McAfee, Virtually Here: The Age of Cyber Warfare, McAfee, Inc
-
McAfee. McAfee virtual criminology report, Virtually Here: The Age of Cyber Warfare, McAfee, Inc, 2009.
-
(2009)
McAfee Virtual Criminology Report
-
-
-
3
-
-
21644469120
-
An undetectable computer virus
-
Sep, IBM Thomas J Watson Research Center, Hawthorne, New York, USA
-
David M. Chess and Steve R. White, An Undetectable Computer Virus, Virus Bulletin Conference, Sep 2000, IBM Thomas J. Watson Research Center, Hawthorne, New York, USA.
-
(2000)
Virus Bulletin Conference
-
-
Chess, D.M.1
White, S.R.2
-
4
-
-
41549098765
-
On the infeasibility of modeling polymorphic shellcode
-
Song Y, Locasto ME, Stavrou A, Keromytis AD, Stolfo SJ, On the infeasibility of modeling polymorphic shellcode, Proceedings of the 14th ACM Conference on Computer and Communications Security (CCS), 2007.
-
(2007)
Proceedings of the 14th ACM Conference on Computer and Communications Security (CCS
-
-
Song, Y.1
Locasto, M.E.2
Stavrou, A.3
Keromytis, A.D.4
Stolfo, S.J.5
-
5
-
-
34047129159
-
Using entropy analysis to find encrypted and packed malware
-
DOI 10.1109/MSP.2007.48
-
Robert Lyda and Jim Hamrock, Using Entropy Analysis to Find Encrypted and Packed Malware, IEEE Security & Privacy, vol 5, pp. 40-45, 2007. (Pubitemid 46527387)
-
(2007)
IEEE Security and Privacy
, vol.5
, Issue.2
, pp. 40-45
-
-
Lyda, R.1
Hamrock, J.2
-
6
-
-
81255177016
-
Defeating polymorphism beyond emulation
-
October
-
Adrian E. Stepan, Defeating Polymorphism beyond Emulation, Virus Bulletin Conference, October 2005.
-
(2005)
Virus Bulletin Conference
-
-
Stepan, A.E.1
-
7
-
-
77949503891
-
Idea: Opcode-sequence-based malware detection
-
Engineering Secure Software and System
-
Igor Santos, Felix Brezo, Javier Nieves, et al, Idea: Opcode-Sequence-Based Malware Detection, Lecture Notes in Computer Science, Engineering Secure Software and System, vol 5969, pp. 35-43, 2010.
-
(2010)
Lecture Notes in Computer Science
, vol.5969
, pp. 35-43
-
-
Santos, I.1
Brezo, F.2
Nieves, J.3
-
8
-
-
71849087786
-
Using a bioinformatics approach to generate accurate exploit-based signatures for polymorphic worms
-
Yong Tang, Bin Xiao, Xicheng Lu, Using a bioinformatics approach to generate accurate exploit-based signatures for polymorphic worms, Journal of Computer & Security, vol 28, pp. 827-842, 2009.
-
(2009)
Journal of Computer & Security
, vol.28
, pp. 827-842
-
-
Tang, Y.1
Xiao, B.2
Lu, X.3
-
9
-
-
71849087786
-
Using a bioinformatics approach to generate accurate exploit-based signatures for polymorphic worms
-
Yong Tang, Bin Xiao, Xicheng Lu, Using a bioinformatics approach to generate accurate exploit-based signatures for polymorphic worms, Journal of Computer & Security, vol 28, pp. 827-842, 2009.
-
(2009)
Journal of Computer & Security
, vol.28
, pp. 827-842
-
-
Tang, Y.1
Xiao, B.2
Lu, X.3
-
10
-
-
77954701461
-
Improving the efficiency of dynamic malware analysis
-
Track on Information Security Research and Applications, Lusanne, Switzerland, March
-
Ulrich Bayer, Engin Kirda and Christopher Kruegel, "Improving the Efficiency of Dynamic Malware Analysis", Proceedings of the 2010 ACM Symposium on Applied Computing, Track on Information Security Research and Applications, Lusanne, Switzerland, March 2010.
-
(2010)
Proceedings of the 2010 ACM Symposium on Applied Computing
-
-
Bayer, U.1
Kirda, E.2
Kruegel, C.3
-
11
-
-
78049363272
-
Malware self protection mechanism issues in conducting malware behavior analysis in a virtual environment as compared to a real environment
-
September
-
Alsagoff, S.N, Malware self protection mechanism issues in conducting malware behavior analysis in a virtual environment as compared to a real environment, 2010 International Symposium in Information Technology (ITSim), vol 3, pp.1326-1331, September 2010.
-
(2010)
2010 International Symposium in Information Technology (ITSim)
, vol.3
, pp. 1326-1331
-
-
Alsagoff, S.N.1
-
15
-
-
84868595716
-
Automated mapping of large binary objects using primitive fragment type classification
-
August
-
Gregory Conti, Sergey Bratus, Anna Shubina, et al, Automated mapping of large binary objects using primitive fragment type classification, The proceedings of the tenth annual Digital Forensics Research conference, vol 7, pp. (7) S3-S12, August 2010.
-
(2010)
The Proceedings of the Tenth Annual Digital Forensics Research Conference
, vol.7
, Issue.7
-
-
Conti, G.1
Bratus, S.2
Shubina, A.3
-
16
-
-
49949117136
-
On the limits of information flow techniques for malware analysis and containment
-
Detection of Intrusion and Malware, and Vulnerability Assessment
-
Lorenzo Cavallaro, Prateek Saxena and R.Sekar, On the limits of information flow techniques for malware analysis and containment, Lecture Notes in Computer Science, Vol 5137, Detection of Intrusion and Malware, and Vulnerability Assessment, pp. 143-163, 2008.
-
(2008)
Lecture Notes in Computer Science
, vol.5137
, pp. 143-163
-
-
Cavallaro, L.1
Saxena, P.2
Sekar, R.3
-
17
-
-
54849442042
-
Constructing malware normalizes using term rewriting
-
Andrew Walenstein, Rachit Mathur, Mohamed R. Chouchane, Arun Lakhotia, Constructing malware normalizes using term rewriting, Journal of Computer Virology, pp. (4) 307-322, 2008.
-
(2008)
Journal of Computer Virology
, vol.4
, pp. 307-322
-
-
Walenstein, A.1
Mathur, R.2
Chouchane, M.R.3
Lakhotia, A.4
-
21
-
-
81255211647
-
-
Polymorphic Code: http://en.wikipedia.org/wiki/Polymorphic-code
-
-
-
-
23
-
-
0037269111
-
Reliable identification of bounded-length viruses is NP-complete
-
January
-
Spinellis, D, Reliable identification of bounded-length viruses is NP-complete. Information Theory, IEEE Transactions, Vol 49, pp. 280-284, January 2003.
-
(2003)
Information Theory IEEE Transactions
, vol.49
, pp. 280-284
-
-
Spinellis, D.1
-
24
-
-
33746406796
-
Detecting self-mutating malware using control-flow graph matching
-
Detection of Intrusions and Malware and Vulnerability Assessment - Third International Conference, DIMVA 2006, Proceedings
-
Danilo Bruschi, Lorenzo Martignoni, Mattia Monga, Detecting self-mutating malware using control-flow graph matching, Lecture Notes in Computer Science, Detection of Intrusions and Malware & Vulnerability Assessment, Vol 4046, PP. 129-143, 2006. (Pubitemid 44124006)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4064
, pp. 129-143
-
-
Bruschi, D.1
Martignoni, L.2
Monga, M.3
-
26
-
-
81255177014
-
-
Metamorphic Code: http://en.wikipedia.org/wiki/Metamorphic-code
-
-
-
-
27
-
-
85156147536
-
Impeding malware analysis using conditional code obfuscation
-
San Diego, CA
-
Sharif, M., Lanzi, A., Giffin, J., Lee, W, Impeding malware analysis using conditional code obfuscation, In Network and Distributed System Security Symposium. San Diego, CA, 2008.
-
(2008)
Network and Distributed System Security Symposium
-
-
Sharif, M.1
Lanzi, A.2
Giffin, J.3
Lee, W.4
|