-
3
-
-
84856154709
-
Automatic Generation of String Signatures for Malware Detection
-
K. Griffin, et al., "Automatic Generation of String Signatures for Malware Detection," in Recent Advances in Intrusion Detection: 12th International Symposium, RAID 2009, Saint-Malo, France, 2009.
-
Recent Advances in Intrusion Detection: 12th International Symposium, RAID 2009, Saint-Malo, France, 2009
-
-
Griffin, K.1
-
5
-
-
0016518897
-
Efficient string matching: An aid to bibliographic search
-
A. V. Aho and M. J. Corasick, "Efficient string matching: an aid to bibliographic search," Communications of the ACM, vol. 18, p. 340, 1975.
-
(1975)
Communications of the ACM
, vol.18
, pp. 340
-
-
Aho, A.V.1
Corasick, M.J.2
-
7
-
-
33745670395
-
Polymorphic worm detection using structural information of executables
-
C. Kruegel, et al., "Polymorphic worm detection using structural information of executables," Lecture notes in computer science, vol. 3858, p. 207, 2006.
-
(2006)
Lecture Notes in Computer Science
, vol.3858
, pp. 207
-
-
Kruegel, C.1
-
8
-
-
34547464948
-
-
University of Wisconsin, Madison, Wisconsin, USA Technical Report #1539
-
M. Christodorescu, et al., "Malware normalization," University of Wisconsin, Madison, Wisconsin, USA Technical Report #1539, 2005.
-
(2005)
Malware Normalization
-
-
Christodorescu, M.1
-
11
-
-
33746882464
-
Malware phylogeny generation using permutations of code
-
M. E. Karim, et al., "Malware phylogeny generation using permutations of code," Journal in Computer Virology, vol. 1, pp. 13-23, 2005.
-
(2005)
Journal in Computer Virology
, vol.1
, pp. 13-23
-
-
Karim, M.E.1
-
12
-
-
60649088451
-
McBoost: Boosting Scalability in Malware Collection and Analysis Using Statistical Classification of Executables
-
R. Perdisci, et al., "McBoost: Boosting Scalability in Malware Collection and Analysis Using Statistical Classification of Executables," in Proceedings of the 2008 Annual Computer Security Applications Conference, 2008, pp. 301-310.
-
(2008)
Proceedings of the 2008 Annual Computer Security Applications Conference
, pp. 301-310
-
-
Perdisci, R.1
-
17
-
-
27544433210
-
Semantics-aware malware detection
-
M. Christodorescu, et al., "Semantics-aware malware detection," in Proceedings of the 2005 IEEE Symposium on Security and Privacy (S&P 2005), Oakland, California, USA, 2005.
-
(2005)
Proceedings of the 2005 IEEE Symposium on Security and Privacy (S&P 2005), Oakland, California, USA
-
-
Christodorescu, M.1
-
20
-
-
77954325210
-
Graphs, Entropy and Grid Computing: Automatic Comparison of Malware
-
I. Briones and A. Gomez, "Graphs, Entropy and Grid Computing: Automatic Comparison of Malware," in Virus Bulletin Conference, 2008, pp. 1-12.
-
Virus Bulletin Conference, 2008
, pp. 1-12
-
-
Briones, I.1
Gomez, A.2
-
21
-
-
74049142314
-
Large-Scale Malware Indexing Using Function- Call Graphs
-
Chicago, Illinois, USA
-
X. Hu, et al., "Large-Scale Malware Indexing Using Function- Call Graphs," in Computer and Communications Security, Chicago, Illinois, USA, pp. 611-620.
-
Computer and Communications Security
, pp. 611-620
-
-
Hu, X.1
-
22
-
-
77954316719
-
Graph-based comparison of Executable Objects (English Version)
-
T. Dullien and R. Rolles, "Graph-based comparison of Executable Objects (English Version)," in SSTIC, 2005.
-
(2005)
SSTIC
-
-
Dullien, T.1
Rolles, R.2
-
23
-
-
36549026467
-
Polymorphic malware detection and identification via context-free grammar homomorphism
-
R. T. Gerald and A. F. Lori, "Polymorphic malware detection and identification via context-free grammar homomorphism," Bell Labs Technical Journal, vol. 12, pp. 139-147, 2007.
-
(2007)
Bell Labs Technical Journal
, vol.12
, pp. 139-147
-
-
Gerald, R.T.1
Lori, A.F.2
-
26
-
-
58149090298
-
Morphological Detection of Malware
-
G. Bonfante, et al., "Morphological Detection of Malware," in International Conference on Malicious and Unwanted Software, IEEE, Alexendria VA, USA, 2008, pp. 1-8.
-
International Conference on Malicious and Unwanted Software, IEEE, Alexendria VA, USA, 2008
, pp. 1-8
-
-
Bonfante, G.1
-
28
-
-
0027188633
-
Data structures and algorithms for nearest neighbor search in general metric spaces
-
N. Y. Peter, "Data structures and algorithms for nearest neighbor search in general metric spaces," in Proceedings of the fourth annual ACM-SIAM Symposium on Discrete algorithms, Austin, Texas, United States, 1993, pp. 311-321.
-
Proceedings of the Fourth Annual ACM-SIAM Symposium on Discrete Algorithms, Austin, Texas, United States, 1993
, pp. 311-321
-
-
Peter, N.Y.1
-
29
-
-
33644505034
-
DBM-Tree: A Dynamic Metric Access Method Sensitive to Local Density Data
-
M. R. Vieira, et al., "DBM-Tree: A Dynamic Metric Access Method Sensitive to Local Density Data.," in Brazilian Symposium on Databases, Brazil, 2004, pp. 163-177.
-
Brazilian Symposium on Databases, Brazil, 2004
, pp. 163-177
-
-
Vieira, M.R.1
-
30
-
-
34748820878
-
Polyunpack: Automating the hidden-code extraction of unpack-executing malware
-
P. Royal, et al., "Polyunpack: Automating the hidden-code extraction of unpack-executing malware," in Computer Security Applications Conference, 2006, pp. 289-300.
-
Computer Security Applications Conference, 2006
, pp. 289-300
-
-
Royal, P.1
-
31
-
-
85084160818
-
Static disassembly of obfuscated binaries
-
C. Kruegel, et al., "Static disassembly of obfuscated binaries," in USENIX Security Symposium, 2004, pp. 18-18.
-
USENIX Security Symposium, 2004
, pp. 18-18
-
-
Kruegel, C.1
-
34
-
-
84856154714
-
-
26 March 2010. Available
-
(2010, 26 March 2010). GDBI Arboretum. Available: http://gbdi.icmc.usp. br/arboretum
-
(2010)
GDBI Arboretum
-
-
-
37
-
-
84856186789
-
-
21 September 2009. Available
-
(2009, 21 September 2009). mwcollect Alliance. Available: http://alliance.mwcollect.org
-
(2009)
-
-
-
38
-
-
84856146776
-
-
26 March 2010. Available
-
(2010, 26 March 2010). Cygwin. Available: http://www.cygwin.com
-
(2010)
-
-
-
39
-
-
77954335796
-
-
21 September 2009. Available
-
(2009, 21 September 2009). Offensive Computing. Available: http://www.offensivecomputing.net
-
(2009)
Offensive Computing
-
-
|