-
1
-
-
84855746345
-
-
Tech. Rep. [Online]
-
M. Labs, "Mcafee threats report: First quarter 2011," McAfee, Tech. Rep., 2011. [Online]. Available: https://secure.mcafee.com/us/resources/ reports/rpquarterly-threat-q1-2011.pdf
-
(2011)
Mcafee Threats Report: First Quarter 2011
-
-
Labs, M.1
-
4
-
-
79957865085
-
Nether: In-guest detection of out-of-the-guest malware analyzers
-
ser. EUROSEC '11. New York, NY, USA: ACM
-
G. Pék, B. Bencsáth, and L. Buttyán, "nether: in-guest detection of out-of-the-guest malware analyzers," in Proceedings of the Fourth European Workshop on System Security, ser. EUROSEC '11. New York, NY, USA: ACM, 2011, pp. 3:1-3:6.
-
(2011)
Proceedings of the Fourth European Workshop on System Security
, pp. 31-36
-
-
Pék, G.1
Bencsáth, B.2
Buttyán, L.3
-
6
-
-
70349240080
-
Ether: Malware analysis via hardware virtualization extensions
-
ser. CCS '08. New York, NY, USA: ACM
-
A. Dinaburg, P. Royal, M. Sharif, and W. Lee, "Ether: malware analysis via hardware virtualization extensions," in Proceedings of the 15th ACM conference on Computer and communications security, ser. CCS '08. New York, NY, USA: ACM, 2008, pp. 51-62.
-
(2008)
Proceedings of the 15th ACM Conference on Computer and Communications Security
, pp. 51-62
-
-
Dinaburg, A.1
Royal, P.2
Sharif, M.3
Lee, W.4
-
8
-
-
53349091372
-
Compatibility is not transparency: VMM detection myths and realities
-
May
-
T. Garfinkel, K. Adams, A. Warfield, and J. Franklin, "Compatibility is Not Transparency: VMM Detection Myths and Realities," in Proceedings of the 11th Workshop on Hot Topics in Operating Systems (HotOS-XI), May 2007.
-
(2007)
Proceedings of the 11th Workshop on Hot Topics in Operating Systems (HotOS-XI)
-
-
Garfinkel, T.1
Adams, K.2
Warfield, A.3
Franklin, J.4
-
11
-
-
77955866574
-
A fistful of red-pills: How to automatically generate procedures to detect CPU emulators
-
Montreal, Canada: ACM
-
R. Paleari, L. Martignoni, G. Fresi Roglia, and D. Bruschi, "A fistful of red-pills: How to automatically generate procedures to detect CPU emulators," in Proceedings of the 3rd USENIX Workshop on Offensive Technologies (WOOT). Montreal, Canada: ACM.
-
Proceedings of the 3rd USENIX Workshop on Offensive Technologies (WOOT)
-
-
Paleari, R.1
Martignoni, L.2
Fresi Roglia, G.3
Bruschi, D.4
-
12
-
-
84872113696
-
Efficient detection of split personalities in malware
-
San Diego, CA, February
-
D. Balzarotti, M. Cova, C. Karlberger, C. Kruegel, E. Kirda, and G. Vigna, "Efficient Detection of Split Personalities in Malware," in Proceedings of the Network and Distributed System Security Symposium (NDSS), San Diego, CA, February 2010.
-
(2010)
Proceedings of the Network and Distributed System Security Symposium (NDSS)
-
-
Balzarotti, D.1
Cova, M.2
Karlberger, C.3
Kruegel, C.4
Kirda, E.5
Vigna, G.6
-
13
-
-
79951822761
-
-
EECS Department, University of California, Berkeley, Tech. Rep., May
-
M. G. Kang, H. Yin, S. Hanna, S. McCamant, and D. Song, "Emulating emulation-resistant malware," EECS Department, University of California, Berkeley, Tech. Rep., May 2009.
-
(2009)
Emulating Emulation-resistant Malware
-
-
Kang, M.G.1
Yin, H.2
Hanna, S.3
McCamant, S.4
Song, D.5
-
14
-
-
77955172332
-
Measuring virtual machine detection in malware using dsd tracer
-
10.1007/s11416-008-0096-y
-
B. Lau and V. Svajcer, "Measuring virtual machine detection in malware using dsd tracer," Journal in Computer Virology, vol. 6, pp. 181-195, 2010, 10.1007/s11416-008-0096-y.
-
(2010)
Journal in Computer Virology
, vol.6
, pp. 181-195
-
-
Lau, B.1
Svajcer, V.2
-
15
-
-
84855682989
-
-
[Online]
-
"Juzt-reboot." [Online]. Available: http://www.juzt-reboot.com/
-
Juzt-reboot
-
-
-
16
-
-
84855682993
-
-
[Online]
-
"Partimage." [Online]. Available: http://www.partimage.org/
-
Partimage
-
-
-
17
-
-
85029681162
-
Return-oriented rootkits: Bypassing kernel code integrity protection mechanisms
-
ser. SSYM'09. Berkeley, CA, USA: USENIX Association
-
R. Hund, T. Holz, and F. C. Freiling, "Return-oriented rootkits: bypassing kernel code integrity protection mechanisms," in Proceedings of the 18th conference on USENIX security symposium, ser. SSYM'09. Berkeley, CA, USA: USENIX Association, 2009, pp. 383-398.
-
(2009)
Proceedings of the 18th Conference on USENIX Security Symposium
, pp. 383-398
-
-
Hund, R.1
Holz, T.2
Freiling, F.C.3
-
19
-
-
0037993654
-
-
[Online]
-
"Fast memory copy." [Online]. Available: http://now.cs. berkeley.edu/Td/bcopy.html
-
Fast Memory Copy
-
-
-
20
-
-
77949441598
-
Stealthy malware detection and monitoring through vmm-based " out-of-the-box" semantic view reconstruction
-
March
-
X. Jiang, X. Wang, and D. Xu, "Stealthy malware detection and monitoring through vmm-based "out-of-the-box" semantic view reconstruction," ACM Trans. Inf. Syst. Secur., vol. 13, pp. 12:1-12:28, March 2010.
-
(2010)
ACM Trans. Inf. Syst. Secur.
, vol.13
, pp. 121-1228
-
-
Jiang, X.1
Wang, X.2
Xu, D.3
-
21
-
-
53349116756
-
Towards an understanding of anti-virtualization and anti-debugging behavior in modern malware
-
Anchorage, Alaska, USA, June
-
X. Chen, J. Andersen, Z. M. Mao, M. Bailey, and J. Nazario, "Towards an Understanding of Anti-Virtualization and Anti-Debugging Behavior in Modern Malware," in Proceedings of the 38th Annual IEEE International Conference on Dependable Systems and Networks (DSN '08), Anchorage, Alaska, USA, June 2008, pp. 177-186.
-
(2008)
Proceedings of the 38th Annual IEEE International Conference on Dependable Systems and Networks (DSN '08)
, pp. 177-186
-
-
Chen, X.1
Andersen, J.2
Mao, Z.M.3
Bailey, M.4
Nazario, J.5
-
22
-
-
84855682992
-
Avmm: Virtualize client with a bare-metal and asymmetric partitioning approach
-
Submitted, Tech. Rep.
-
N. Xiong, Y. Zhou, H. Liu, and Y. Zhang, "Avmm: Virtualize client with a bare-metal and asymmetric partitioning approach," Submitted, ICC 2011, Tech. Rep., 2011.
-
(2011)
ICC 2011
-
-
Xiong, N.1
Zhou, Y.2
Liu, H.3
Zhang, Y.4
-
23
-
-
77954597899
-
Otherworld: Givingapplications a chance to survive os kernel crashes
-
A. Depoutovitch and M. Stumm, "Otherworld: givingapplications a chance to survive os kernel crashes," in EuroSys, 2010, pp. 181-194.
-
(2010)
EuroSys
, pp. 181-194
-
-
Depoutovitch, A.1
Stumm, M.2
-
25
-
-
79953223325
-
Fast and correct performance recovery of operating systems using a virtual machine monitor
-
ser. VEE '11. New York, NY, USA: ACM
-
-, "Fast and correct performance recovery of operating systems using a virtual machine monitor," in Proceedings of the 7th ACM SIGPLAN/SIGOPS international conference on Virtual execution environments, ser. VEE '11. New York, NY, USA: ACM, 2011, pp. 99-110.
-
(2011)
Proceedings of the 7th ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments
, pp. 99-110
-
-
Kourai, K.1
-
26
-
-
84976789801
-
The recovery box: Using fast recovery to provide high availability in the unix environment
-
M. Baker and M. Sullivan, "The recovery box: Using fast recovery to provide high availability in the unix environment," in In Proceedings USENIX Summer Conference, 1992, pp. 31-43.
-
(1992)
Proceedings USENIX Summer Conference
, pp. 31-43
-
-
Baker, M.1
Sullivan, M.2
-
27
-
-
84855678477
-
-
[Online]
-
"Norman sandbox analyzer." [Online]. Available: http://www.norman.com/products/sandbox analyzer/en
-
Norman Sandbox Analyzer
-
-
|