-
1
-
-
84855673011
-
-
Retrieved September 2010 from
-
Adblock List. Retrieved September 2010 from https://secure.fanboy.co.nz/ fanboy-adblock.txt.
-
-
-
-
2
-
-
84855679313
-
-
Anubis. http://anubis.iseclab.org.
-
-
-
-
3
-
-
84855673010
-
-
CWSandbox. http://www.cwsandbox.org.
-
-
-
-
5
-
-
84855698309
-
-
Norman Sandbox. http://sandbox.norman.com.
-
-
-
-
6
-
-
84855698311
-
-
ThreatExpert. http://www.threatexpert.com.
-
-
-
-
7
-
-
84855648582
-
-
Virustotal. http://www.virustotal.com.
-
-
-
-
8
-
-
84855666605
-
-
Zeus Tracker. https://zeustracker.abuse.ch.
-
-
-
-
11
-
-
58149084148
-
Automated classification and analysis of internet malware
-
M. Bailey, J. Oberheide, J. Andersen, Z. Mao, F. Jahanian, and J. Nazario. Automated Classification and Analysis of Internet Malware. In Symposium on Recent Advances in Intrusion Detection (RAID), 2007.
-
(2007)
Symposium on Recent Advances in Intrusion Detection (RAID)
-
-
Bailey, M.1
Oberheide, J.2
Andersen, J.3
Mao, Z.4
Jahanian, F.5
Nazario, J.6
-
14
-
-
85043201839
-
Scalable, behavior-based malware clustering
-
U. Bayer, P. Milani Comparetti, C. Kruegel, and E. Kirda. Scalable, Behavior-Based Malware Clustering. In Network and Distributed System Security (NDSS), 2009.
-
(2009)
Network and Distributed System Security (NDSS)
-
-
Bayer, U.1
Milani Comparetti, P.2
Kruegel, C.3
Kirda, E.4
-
15
-
-
78549259165
-
On the analysis of the zeus botnet crimeware toolkit
-
H. Binsalleeh, T. Ormerod, A. Boukhtouta, P. Sinha, A. Youssef, M. Debbabi, and L. Wang. On the analysis of the zeus botnet crimeware toolkit. In International Conference on Privacy, Security and Trust, 2010.
-
(2010)
International Conference on Privacy, Security and Trust
-
-
Binsalleeh, H.1
Ormerod, T.2
Boukhtouta, A.3
Sinha, P.4
Youssef, A.5
Debbabi, M.6
Wang, L.7
-
16
-
-
84855666606
-
VirusTotal timing information
-
Private communication
-
J. Canto. VirusTotal Timing Information. Hispasec Systemas. Private communication, 2011.
-
(2011)
Hispasec Systemas
-
-
Canto, J.1
-
17
-
-
84855648584
-
-
A. Decker, D. Sancho, L. Kharouni, M. Goncharov, and R. McArdle. A study of the Pushdo / Cutwail Botnet. http://us.trendmicro.com/imperia/md/content/us/ pdf/threats/securitylibrary/Study-of-pushdo.pdf, 2009.
-
(2009)
Cutwail Botnet
-
-
Decker, A.1
Sancho, D.2
Kharouni, L.3
Goncharov, M.4
McArdle, R.5
-
19
-
-
50949133669
-
LIBLINEAR: A library for large linear classification
-
R.-E. Fan, K.-W. Chang, C.-J. Hsieh, X.-R. Wang, and C.-J. Lin. LIBLINEAR: A Library for Large Linear Classification. Journal of Machine Learning Research, 9, 2008.
-
(2008)
Journal of Machine Learning Research
, vol.9
-
-
Fan, R.-E.1
Chang, K.-W.2
Hsieh, C.-J.3
Wang, X.-R.4
Lin, C.-J.5
-
23
-
-
80255128580
-
A static, packer-agnostic filter to detect similar malware samples
-
G. Jacob, M. Neugschwandtner, P. Milani Comparetti, C. Kruegel, and G. Vigna. A static, packer-agnostic filter to detect similar malware samples. Technical Report 2010-26, UC Santa Barbara, 2010.
-
(2010)
Technical Report 2010-26, UC Santa Barbara
-
-
Jacob, G.1
Neugschwandtner, M.2
Milani Comparetti, P.3
Kruegel, C.4
Vigna, G.5
-
27
-
-
84855669178
-
The shuns and stuns that take the fight to the enemy
-
B. Krebs. Takedowns: The Shuns and Stuns That Take the Fight to the Enemy. McAfee Security Journal, (6), 2010.
-
(2010)
McAfee Security Journal
, Issue.6
-
-
Krebs. Takedowns, B.1
-
28
-
-
48649084773
-
Omniunpack: Fast, generic, and safe unpacking of malware
-
L. Martignoni, M. Christodorescu, and S. Jha. Omniunpack: Fast, generic, and safe unpacking of malware. In Annual Computer Security Applications Conf. (ACSAC), 2007.
-
(2007)
Annual Computer Security Applications Conf. (ACSAC)
-
-
Martignoni, L.1
Christodorescu, M.2
Jha, S.3
-
31
-
-
84875853858
-
Automatic generation of remediation procedures for malware infections
-
R. Paleari, L. Martignoni, E. Passerini, D. Davidson, M. Fredrikson, J. Giffin, and S. Jha. Automatic Generation of Remediation Procedures for Malware Infections. In USENIX Security Symposium, 2010.
-
(2010)
USENIX Security Symposium
-
-
Paleari, R.1
Martignoni, L.2
Passerini, E.3
Davidson, D.4
Fredrikson, M.5
Giffin, J.6
Jha, S.7
-
32
-
-
85084164413
-
Bro: A system for detecting network intruders in real-time
-
V. Paxson. Bro: A System for Detecting Network Intruders in Real-Time. In USENIX Security Symposium, 1998.
-
(1998)
USENIX Security Symposium
-
-
Paxson, V.1
-
33
-
-
60649088451
-
McBoost: Boosting scalability in malware collection and analysis using statistical classification of executables
-
R. Perdisci, A. Lanzi, and W. Lee. McBoost: Boosting Scalability in Malware Collection and Analysis Using Statistical Classification of Executables. In Annual Computer Security Applications Conference (ACSAC), 2008.
-
(2008)
Annual Computer Security Applications Conference (ACSAC)
-
-
Perdisci, R.1
Lanzi, A.2
Lee, W.3
-
36
-
-
70450279044
-
Learning and classification of malware behavior
-
K. Rieck, T. Holz, C. Willems, P. Düssel, and P. Laskov. Learning and Classification of Malware Behavior. In Detection of Intrusions and Malware and Vulnerability Assessment (DIMVA), 2008.
-
(2008)
Detection of Intrusions and Malware and Vulnerability Assessment (DIMVA)
-
-
Rieck, K.1
Holz, T.2
Willems, C.3
Düssel, P.4
Laskov, P.5
-
37
-
-
34748820878
-
PolyUnpack: Automating the hidden-code extraction of unpack-executing malware
-
P. Royal, M. Halpin, D. Dagon, R. Edmonds, and W. Lee. PolyUnpack: Automating the Hidden-Code Extraction of Unpack-Executing Malware. In 22nd Annual Computer Security Applications Conf. (ACSAC), 2006.
-
(2006)
22nd Annual Computer Security Applications Conf. (ACSAC)
-
-
Royal, P.1
Halpin, M.2
Dagon, D.3
Edmonds, R.4
Lee, W.5
-
39
-
-
77950794331
-
FIRE: FInding rogue nEtworks
-
B. Stone-Gross, A. Moser, C. Kruegel, K. Almaroth, and E. Kirda. FIRE: FInding Rogue nEtworks. In Annual Computer Security Applications Conference (ACSAC), 2009.
-
(2009)
Annual Computer Security Applications Conference (ACSAC)
-
-
Stone-Gross, B.1
Moser, A.2
Kruegel, C.3
Almaroth, K.4
Kirda, E.5
|