-
2
-
-
38149089416
-
Automated classification and analysis of internet malware
-
ser. Lecture Notes in Computer Science, C. Krügel, R. Lippmann, and A. Clark, Eds. Springer
-
M. Bailey, J. Oberheide, J. Andersen, Z. M. Mao, F. Jahanian, and J. Nazario, "Automated classification and analysis of internet malware," in RAID, ser. Lecture Notes in Computer Science, C. Krügel, R. Lippmann, and A. Clark, Eds., vol. 4637. Springer, 2007, pp. 178-197.
-
(2007)
RAID
, vol.4637
, pp. 178-197
-
-
Bailey, M.1
Oberheide, J.2
Andersen, J.3
Mao, Z.M.4
Jahanian, F.5
Nazario, J.6
-
4
-
-
80955164889
-
-
Cylab, Carnegie Mellon University, Pittsburgh, PA, Technical Report CMU-Cylab-10-022, May
-
J. Jang, D. Brumley, and S. Venkataraman, "Bitshred: Fast, scalable malware triage," Cylab, Carnegie Mellon University, Pittsburgh, PA, Technical Report CMU-Cylab-10-022, May 2010.
-
(2010)
Bitshred: Fast, Scalable Malware Triage
-
-
Jang, J.1
Brumley, D.2
Venkataraman, S.3
-
5
-
-
52249094557
-
Identifying almost identical files using context triggered piecewise hashing
-
J. D. Kornblum, "Identifying almost identical files using context triggered piecewise hashing," Digital Investigation, vol. 3, no. Supplement-1, pp. 91-97, 2006.
-
(2006)
Digital Investigation
, vol.3
, Issue.SUPPL. 1
, pp. 91-97
-
-
Kornblum, J.D.1
-
8
-
-
74049142314
-
Large-scale malware indexing using function-call graphs
-
X. Hu, T. Chiueh, and K. G. Shin, "Large-scale malware indexing using function-call graphs," in Computer and Communications Security, 2009, pp. 611-620.
-
(2009)
Computer and Communications Security
, pp. 611-620
-
-
Hu, X.1
Chiueh, T.2
Shin, K.G.3
-
9
-
-
84855793418
-
Malware classification based on call graph clustering
-
J. Kinable and O. Kostakis, "Malware classification based on call graph clustering," CoRR, vol. abs/1008.4365, 2010.
-
(2010)
CoRR
, vol.1008
, Issue.4365
-
-
Kinable, J.1
Kostakis, O.2
-
10
-
-
84855795320
-
A malware instruction set for behavior-based analysis
-
ser. LNI, F. C. Freiling, Ed.
-
P. Trinius, C. Willems, T. Holz, and K. Rieck, "A malware instruction set for behavior-based analysis," in Sicherheit, ser. LNI, F. C. Freiling, Ed., vol. 170. GI, 2010, pp. 205-216.
-
(2010)
Sicherheit
, vol.170
, Issue.GI
, pp. 205-216
-
-
Trinius, P.1
Willems, C.2
Holz, T.3
Rieck, K.4
-
11
-
-
79958743806
-
Automatic analysis of malware behavior using machine learning
-
K. Rieck, P. Trinius, C. Willems, and T. Holz, "Automatic analysis of malware behavior using machine learning," Journal of Computer Security, vol. 19, no. 3, 2011.
-
(2011)
Journal of Computer Security
, vol.19
, Issue.3
-
-
Rieck, K.1
Trinius, P.2
Willems, C.3
Holz, T.4
-
12
-
-
78249253017
-
On challenges in evaluating malware clustering
-
ser. Lecture Notes in Computer Science, S. Jha, R. Sommer, and C. Kreibich, Eds. Springer
-
P. Li, L. Liu, D. Gao, and M. K. Reiter, "On challenges in evaluating malware clustering," in RAID, ser. Lecture Notes in Computer Science, S. Jha, R. Sommer, and C. Kreibich, Eds., vol. 6307. Springer, 2010, pp. 238-255.
-
(2010)
RAID
, vol.6307
, pp. 238-255
-
-
Li, P.1
Liu, L.2
Gao, D.3
Reiter, M.K.4
-
13
-
-
84924223669
-
Static analysis of executables to detect malicious patterns
-
USENIX Association. USENIX Association, Aug.
-
M. Christodorescu and S. Jha, "Static analysis of executables to detect malicious patterns," in Proceedings of the 12th USENIX Security Symposium (Security'03), USENIX Association. USENIX Association, Aug. 2003, pp. 169-186.
-
(2003)
Proceedings of the 12th USENIX Security Symposium (Security'03)
, pp. 169-186
-
-
Christodorescu, M.1
Jha, S.2
-
14
-
-
84875656430
-
Exploiting similarity between variants to defeat malware
-
A. Walenstein, M. Venable, M. Hayes, C. Thompson, and A. Lakhotia, "Exploiting similarity between variants to defeat malware," in Proceedings of BlackHat 2007 DC Briefings, 2007.
-
(2007)
Proceedings of BlackHat 2007 DC Briefings
-
-
Walenstein, A.1
Venable, M.2
Hayes, M.3
Thompson, C.4
Lakhotia, A.5
-
16
-
-
84855801128
-
-
[Online]
-
V. Alvarez, "The yara project." [Online]. Available: http://code.google.com/p/yara-project
-
-
-
Alvarez, V.1
-
19
-
-
73449135786
-
Automatic static unpacking of malware binaries
-
Washington, DC, USA: IEEE Computer Society. [Online]
-
K. Coogan, S. Debray, T. Kaochar, and G. Townsend, "Automatic static unpacking of malware binaries," in Proceedings of the 2009 16th Working Conference on Reverse Engineering, ser. WCRE '09. Washington, DC, USA: IEEE Computer Society, 2009, pp. 167-176. [Online]. Available: http://dx.doi.org/10. 1109/WCRE.2009.24
-
(2009)
Proceedings of the 2009 16th Working Conference on Reverse Engineering, Ser. WCRE '09
, pp. 167-176
-
-
Coogan, K.1
Debray, S.2
Kaochar, T.3
Townsend, G.4
-
20
-
-
84855793421
-
Exploiting similarity between variants to defeat malware
-
July 2007
-
D. Quist, "Exploiting similarity between variants to defeat malware," in Proceedings of BlackHat USA 2007, July 2007.
-
(2007)
Proceedings of BlackHat USA
-
-
Quist, D.1
|