-
1
-
-
33947609379
-
On the Possibility of Practically Obfuscating Programs Towards a Unified Perspective of Code Protection
-
Beaucamps, P., Filiol, E.: On the Possibility of Practically Obfuscating Programs Towards a Unified Perspective of Code Protection. Journal in Computer Virology 3(1), 3-21 (2007)
-
(2007)
Journal in Computer Virology
, vol.3
, Issue.1
, pp. 3-21
-
-
Beaucamps, P.1
Filiol, E.2
-
2
-
-
74049095923
-
Dispatcher: Enabling Active Botnet Infiltration using Automatic Protocol Reverse-Engineering
-
Caballero, J., Poosankam, P., Kreibich, C., Song, D.: Dispatcher: Enabling Active Botnet Infiltration using Automatic Protocol Reverse-Engineering. In: ACM Conference on Computer and Communications Security, CCS (2009)
-
ACM Conference on Computer and Communications Security, CCS (2009)
-
-
Caballero, J.1
Poosankam, P.2
Kreibich, C.3
Song, D.4
-
3
-
-
78650029404
-
Input Generation via Decomposition and Re-stitching: Finding Bugs in Malware
-
Caballero, J., Poosankam, P., McCamant, S., Babić, D., Song, D.: Input Generation via Decomposition and Re-stitching: Finding Bugs in Malware. In: ACM Conference on Computer and Communications Security (2010)
-
ACM Conference on Computer and Communications Security (2010)
-
-
Caballero, J.1
Poosankam, P.2
McCamant, S.3
Babić, D.4
Song, D.5
-
4
-
-
77952403312
-
Polyglot: Automatic Extraction of Protocol Message Format Using Dynamic Binary Analysis
-
Caballero, J., Yin, H., Liang, Z., Song, D.: Polyglot: Automatic Extraction of Protocol Message Format Using Dynamic Binary Analysis. In: ACM Conference on Computer and Communications Security, CCS (2007)
-
ACM Conference on Computer and Communications Security, CCS (2007)
-
-
Caballero, J.1
Yin, H.2
Liang, Z.3
Song, D.4
-
5
-
-
85084097128
-
Measurements and Mitigation of Peer-to-Peer-based Botnets: A Case Study on Storm Worm
-
Holz, T., Steiner, M., Dahl, F., Biersack, E., Freiling, F.: Measurements and Mitigation of Peer-to-Peer-based Botnets: A Case Study on Storm Worm. In: First USENIX Workshop on Large-Scale Exploits and Emergent Threats, LEET (2008)
-
First USENIX Workshop on Large-Scale Exploits and Emergent Threats, LEET (2008)
-
-
Holz, T.1
Steiner, M.2
Dahl, F.3
Biersack, E.4
Freiling, F.5
-
6
-
-
48649105829
-
Improving Signature Testing through Dynamic Data Flow Analysis
-
IEEE Computer Society, Los Alamitos
-
Kruegel, C., Balzarotti, D., Robertson,W.K., Vigna, G.: Improving Signature Testing through Dynamic Data Flow Analysis. In: Annual Computer Security Applications Conference (ACSAC), pp. 53-63. IEEE Computer Society, Los Alamitos (2007)
-
(2007)
Annual Computer Security Applications Conference (ACSAC)
, pp. 53-63
-
-
Kruegel, C.1
Balzarotti, D.2
Robertson, W.K.3
Vigna, G.4
-
9
-
-
70349288862
-
Automatic Protocol Format Reverse Engineering through Context-Aware Monitored Execution
-
The Internet Society
-
Lin, Z., Jiang, X., Xu, D., Zhang, X.: Automatic Protocol Format Reverse Engineering through Context-Aware Monitored Execution. In: Network and Distributed System Security (NDSS). The Internet Society (2008)
-
(2008)
Network and Distributed System Security (NDSS)
-
-
Lin, Z.1
Jiang, X.2
Xu, D.3
Zhang, X.4
-
11
-
-
31944440969
-
Pin: Building Customized Program Analysis Tools with Dynamic Instrumentation
-
ACM, New York
-
Luk, C., Cohn, R., Muth, R., Patil, H., Klauser, A., Lowney, G., Wallace, S., Reddi, V., Hazelwood, K.: Pin: Building Customized Program Analysis Tools with Dynamic Instrumentation. In: ACM SIGPLAN Conference on Programming Language Design and Implementation, pp. 190-200. ACM, New York (2005)
-
(2005)
ACM SIGPLAN Conference on Programming Language Design and Implementation
, pp. 190-200
-
-
Luk, C.1
Cohn, R.2
Muth, R.3
Patil, H.4
Klauser, A.5
Lowney, G.6
Wallace, S.7
Reddi, V.8
Hazelwood, K.9
-
13
-
-
48649087530
-
Limits of Static Analysis for Malware Detection
-
Moser, A., Kruegel, C., Kirda, E.: Limits of Static Analysis for Malware Detection. In: Annual Computer Security Applications Conference, ACSAC (2007)
-
Annual Computer Security Applications Conference, ACSAC (2007)
-
-
Moser, A.1
Kruegel, C.2
Kirda, E.3
-
14
-
-
79953672829
-
Dynamic Taint Analysis for Automatic Detection, Analysis, and SignatureGeneration of Exploits on Commodity Software
-
Newsome, J., Song, D.X.: Dynamic Taint Analysis for Automatic Detection, Analysis, and SignatureGeneration of Exploits on Commodity Software. In: Network and Distributed System Security, NDSS (2005)
-
(2005)
Network and Distributed System Security, NDSS
-
-
Newsome, J.1
Song, D.X.2
-
16
-
-
77956153922
-
-
Tech. rep., SRI International
-
Porras, P., Saidi, H., Yegneswaran, V.: Conficker C P2P Protocol and Implementation. Tech. rep., SRI International (2009)
-
(2009)
Conficker C P2P Protocol and Implementation
-
-
Porras, P.1
Saidi, H.2
Yegneswaran, V.3
-
17
-
-
84857245291
-
Inside the Storm: Protocols and Encryption of the Storm Botnet
-
Stewart, J.: Inside the Storm: Protocols and Encryption of the Storm Botnet. Black Hat USA (2008)
-
(2008)
Black Hat USA
-
-
Stewart, J.1
-
19
-
-
84857245292
-
Static Disassembly and Code Analysis
-
Vigna, G.: Static Disassembly and Code Analysis. Malware Detection (2006)
-
(2006)
Malware Detection
-
-
Vigna, G.1
-
20
-
-
70350399651
-
ReFormat: Automatic Reverse Engineering of Encrypted Messages
-
Backes, M., Ning, P. (eds.) ESORICS 2009. Springer, Heidelberg
-
Wang, Z., Jiang, X., Cui, W., Wang, X., Grace, M.: ReFormat: Automatic Reverse Engineering of Encrypted Messages. In: Backes, M., Ning, P. (eds.) ESORICS 2009. LNCS, vol. 5789, pp. 200-215. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5789
, pp. 200-215
-
-
Wang, Z.1
Jiang, X.2
Cui, W.3
Wang, X.4
Grace, M.5
-
22
-
-
56549114981
-
Automatic Network Protocol Analysis
-
Wondracek, G., Comparetti, P., Kruegel, C., Kirda, E.: Automatic Network Protocol Analysis. In: Network and Distributed System Security, NDSS (2008)
-
(2008)
Network and Distributed System Security, NDSS
-
-
Wondracek, G.1
Comparetti, P.2
Kruegel, C.3
Kirda, E.4
-
23
-
-
0029705858
-
Cryptovirology: Extortion-Based Security Threats and Counter-measures
-
Young, A., Yung,M.: Cryptovirology: Extortion-Based Security Threats and Counter-measures. In: IEEE Symposium on Security and Privacy. pp. 129-141 (1996)
-
(1996)
IEEE Symposium on Security and Privacy
, pp. 129-141
-
-
Young, A.1
Yung, M.2
|