-
1
-
-
38149089416
-
Automated Classification and Analysis of Internet Malware
-
Kruegel, C., Lippmann, R., Clark, A. (eds.) RAID 2007. Springer, Heidelberg
-
Bailey, M., Oberheide, J., Andersen, J., Mao, Z.M., Jahanian, F., Nazario, J.: Automated Classification and Analysis of Internet Malware. In: Kruegel, C., Lippmann, R., Clark, A. (eds.) RAID 2007. LNCS, vol. 4637, pp. 178-197. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4637
, pp. 178-197
-
-
Bailey, M.1
Oberheide, J.2
Andersen, J.3
Mao, Z.M.4
Jahanian, F.5
Nazario, J.6
-
2
-
-
84872113696
-
Efficient Detection of Split Personalities in Malware
-
Balzarotti, D., Cova, M., Karlberger, C., Kruegel, C., Kirda, E., Vigna, G.: Efficient Detection of Split Personalities in Malware. In: Proceedings of the 17th Annual Network and Distributed System Security Symposium, NDSS (2010)
-
Proceedings of the 17th Annual Network and Distributed System Security Symposium, NDSS (2010)
-
-
Balzarotti, D.1
Cova, M.2
Karlberger, C.3
Kruegel, C.4
Kirda, E.5
Vigna, G.6
-
3
-
-
77955038057
-
Scalable, Behavior-Based Malware Clustering
-
Bayer, U., Comparetti, P., Hlauschek, C., Kruegel, C., Kirda, E.: Scalable, Behavior-Based Malware Clustering. In: Proceedings of the 16th Annual Network and Distributed System Security Symposium, NDSS (2009)
-
Proceedings of the 16th Annual Network and Distributed System Security Symposium, NDSS (2009)
-
-
Bayer, U.1
Comparetti, P.2
Hlauschek, C.3
Kruegel, C.4
Kirda, E.5
-
4
-
-
85084096603
-
A View on Current Malware Behaviors
-
Bayer, U., Habibi, I., Balzarotti, D., Kirda, E., Kruegel, C.: A View on Current Malware Behaviors. In: 2nd USENIXWorkshop on Large-Scale Exploits and Emergent Threats, LEET (2009)
-
2nd USENIXWorkshop on Large-Scale Exploits and Emergent Threats, LEET (2009)
-
-
Bayer, U.1
Habibi, I.2
Balzarotti, D.3
Kirda, E.4
Kruegel, C.5
-
5
-
-
77954701461
-
Improving the Efficiency of Dynamic Malware Analysis
-
Bayer, U., Kirda, E., Kruegel, C.: Improving the Efficiency of Dynamic Malware Analysis. In: Proceedings of the ACM Symposium on Applied Computing, SAC (2010)
-
Proceedings of the ACM Symposium on Applied Computing, SAC (2010)
-
-
Bayer, U.1
Kirda, E.2
Kruegel, C.3
-
8
-
-
53349116756
-
Towards an Understanding of Anti-Virtualization and Anti-Debugging Behavior in Modern Malware
-
Chen, X., Andersen, J., Mao, Z.M., Bailey, M., Nazario, J.: Towards an Understanding of Anti-Virtualization and Anti-Debugging Behavior in Modern Malware. In: Proceedings of the 38th Annual IEEE International Conference on Dependable Systems and Networks, DSN (2008)
-
Proceedings of the 38th Annual IEEE International Conference on Dependable Systems and Networks, DSN (2008)
-
-
Chen, X.1
Andersen, J.2
Mao, Z.M.3
Bailey, M.4
Nazario, J.5
-
9
-
-
70349240080
-
Ether: Malware Analysis via Hardware Virtualization Extensions
-
Dinaburg, A., Royal, P., Sharif, M., Lee,W.: Ether: Malware Analysis via Hardware Virtualization Extensions. In: Proceedings of the ACM Conference on Computer and Communications Security, CCS (2008)
-
Proceedings of the ACM Conference on Computer and Communications Security, CCS (2008)
-
-
Dinaburg, A.1
Royal, P.2
Sharif, M.3
Lee, W.4
-
10
-
-
38349023177
-
Attacks on Virtual Machine Emulators
-
Tech. rep.
-
Ferrie, P.: Attacks on Virtual Machine Emulators. Tech. rep., Symantec Research White Paper (2006)
-
(2006)
Symantec Research White Paper
-
-
Ferrie, P.1
-
12
-
-
53349091372
-
Compatibility is Not Transparency: VMM Detection Myths and Realities
-
Garfinkel, T., Adams, K., Warfield, A., Franklin, J.: Compatibility is Not Transparency: VMM Detection Myths and Realities. In: Proceedings of the 11th Workshop on Hot Topics in Operating Systems, HotOS-XI (2007)
-
Proceedings of the 11th Workshop on Hot Topics in Operating Systems, HotOS-XI (2007)
-
-
Garfinkel, T.1
Adams, K.2
Warfield, A.3
Franklin, J.4
-
14
-
-
84980090975
-
The Distribution of Flora in the Alpine Zone
-
Jaccard, P.: The Distribution of Flora in the Alpine Zone. The New Phytologist 11(2) (1912)
-
(1912)
The New Phytologist
, vol.11
, Issue.2
-
-
Jaccard, P.1
-
15
-
-
80051964097
-
Differential Slicing: Identifying Causal Execution Differences for Security Applications
-
Johnson, N.M., Caballero, J., Chen, K.Z., McCamant, S., Poosankam, P., Reynaud, D., Song, D.: Differential Slicing: Identifying Causal Execution Differences for Security Applications. In: IEEE Symposium on Security and Privacy (2011)
-
IEEE Symposium on Security and Privacy (2011)
-
-
Johnson, N.M.1
Caballero, J.2
Chen, K.Z.3
McCamant, S.4
Poosankam, P.5
Reynaud, D.6
Song, D.7
-
17
-
-
70349448915
-
Renovo: A Hidden Code Extractor for Packed Executables
-
Kang, M.G., Poosankam, P., Yin, H.: Renovo: A Hidden Code Extractor for Packed Executables. In: ACM Workshop on Recurring Malcode, WORM (2007)
-
ACM Workshop on Recurring Malcode, WORM (2007)
-
-
Kang, M.G.1
Poosankam, P.2
Yin, H.3
-
18
-
-
74049124856
-
Emulating Emulation- Resistant Malware
-
Kang, M.G., Yin, H., Hanna, S., McCamant, S., Song, D.: Emulating Emulation- Resistant Malware. In: Proceedings of the 2nd Workshop on Virtual Machine Security, VMSec (2009)
-
Proceedings of the 2nd Workshop on Virtual Machine Security, VMSec (2009)
-
-
Kang, M.G.1
Yin, H.2
Hanna, S.3
McCamant, S.4
Song, D.5
-
20
-
-
77955172332
-
Measuring virtual machine detection in malware using DSD tracer
-
Lau, B., Svajcer, V.: Measuring virtual machine detection in malware using DSD tracer. Journal in Computer Virology 6(3) (2010)
-
(2010)
Journal in Computer Virology
, vol.6
, Issue.3
-
-
Lau, B.1
Svajcer, V.2
-
21
-
-
48649084773
-
OmniUnpack: Fast, Generic, and Safe Unpacking of Malware
-
Martignoni, L., Christodorescu, M., Jha, S.: OmniUnpack: Fast, Generic, and Safe Unpacking of Malware. In: Proceedings of the Annual Computer Security Applications Conference, ACSAC (2007)
-
Proceedings of the Annual Computer Security Applications Conference, ACSAC (2007)
-
-
Martignoni, L.1
Christodorescu, M.2
Jha, S.3
-
22
-
-
71549142277
-
A Framework for Behavior-Based Malware Analysis in the Cloud
-
Prakash, A., Sen Gupta, I. (eds.) ICISS 2009. Springer, Heidelberg
-
Martignoni, L., Paleari, R., Bruschi, D.: A Framework for Behavior-Based Malware Analysis in the Cloud. In: Prakash, A., Sen Gupta, I. (eds.) ICISS 2009. LNCS, vol. 5905, pp. 178-192. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5905
, pp. 178-192
-
-
Martignoni, L.1
Paleari, R.2
Bruschi, D.3
-
24
-
-
84875853858
-
Automatic Generation of Remediation Procedures for Malware Infections
-
Paleari, R., Martignoni, L., Passerini, E., Davidson, D., Fredrikson, M., Giffin, J., Jha, S.: Automatic Generation of Remediation Procedures for Malware Infections. In: Proceedings of the 19th USENIX Conference on Security (2010)
-
Proceedings of the 19th USENIX Conference on Security (2010)
-
-
Paleari, R.1
Martignoni, L.2
Passerini, E.3
Davidson, D.4
Fredrikson, M.5
Giffin, J.6
Jha, S.7
-
25
-
-
85084163236
-
A fistful of red-pills: How to automatically generate procedures to detect CPU emulators
-
Paleari, R., Martignoni, L., Roglia, G.F., Bruschi, D.: A fistful of red-pills: How to automatically generate procedures to detect CPU emulators. In: Proceedings of the 3rd USENIX Workshop on Offensive Technologies, WOOT (2009)
-
Proceedings of the 3rd USENIX Workshop on Offensive Technologies, WOOT (2009)
-
-
Paleari, R.1
Martignoni, L.2
Roglia, G.F.3
Bruschi, D.4
-
26
-
-
79957865085
-
nEther: In-guest Detection of Out-of-the-guest Malware Analyzers
-
Pek, G., Bencsath, B., Buttyan, L.: nEther: In-guest Detection of Out-of-the-guest Malware Analyzers. In: ACM European Workshop on System Security, EUROSEC (2011)
-
ACM European Workshop on System Security, EUROSEC (2011)
-
-
Pek, G.1
Bencsath, B.2
Buttyan, L.3
-
27
-
-
85076751448
-
Behavioral Clustering of HTTP-Based Malware and Signature Generation Using Malicious Network Traces
-
Perdisci, R., Lee,W., Feamster, N.: Behavioral Clustering of HTTP-Based Malware and Signature Generation Using Malicious Network Traces. In: USENIX Conference on Networked Systems Design and Implementation, NSDI (2010)
-
USENIX Conference on Networked Systems Design and Implementation, NSDI (2010)
-
-
Perdisci, R.1
Lee, W.2
Feamster, N.3
-
28
-
-
38149030181
-
Detecting System Emulators
-
Garay, J.A., Lenstra, A.K., Mambo, M., Peralta, R. (eds.) ISC 2007. Springer, Heidelberg
-
Raffetseder, T., Kruegel, C., Kirda, E.: Detecting System Emulators. In: Garay, J.A., Lenstra, A.K., Mambo, M., Peralta, R. (eds.) ISC 2007. LNCS, vol. 4779, pp. 1-18. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4779
, pp. 1-18
-
-
Raffetseder, T.1
Kruegel, C.2
Kirda, E.3
-
30
-
-
77950794331
-
FIRE: FInding Rogue nEtworks
-
Stone-Gross, B., Moser, A., Kruegel, C., Almaroth, K., Kirda, E.: FIRE: FInding Rogue nEtworks. In: Proceedings of the Annual Computer Security Applications Conference, ACSAC (2009)
-
Proceedings of the Annual Computer Security Applications Conference, ACSAC (2009)
-
-
Stone-Gross, B.1
Moser, A.2
Kruegel, C.3
Almaroth, K.4
Kirda, E.5
-
33
-
-
78751631593
-
-
Tech. Rep. 07-2009, University of Mannheim
-
Trinius, P., Willems, C., Holz, T., Rieck, K.: A Malware Instruction Set for Behavior-Based Analysis. Tech. Rep. 07-2009, University of Mannheim (2009)
-
(2009)
A Malware Instruction Set for Behavior-Based Analysis
-
-
Trinius, P.1
Willems, C.2
Holz, T.3
Rieck, K.4
-
35
-
-
34047110218
-
Toward Automated Dynamic Malware Analysis Using CWSandbox
-
Willems, C., Holz, T., Freiling, F.: Toward Automated Dynamic Malware Analysis Using CWSandbox. IEEE Security and Privacy 5(2) (2007)
-
(2007)
IEEE Security and Privacy
, vol.5
, Issue.2
-
-
Willems, C.1
Holz, T.2
Freiling, F.3
-
36
-
-
84857301583
-
Your Sandbox is Blinded: Impact of Decoy Injection to Public Malware Analysis Systems
-
Yoshioka, K., Hosobuchi, Y., Orii, T., Matsumoto, T.: Your Sandbox is Blinded: Impact of Decoy Injection to Public Malware Analysis Systems. Journal of Information Processing 19 (2011)
-
(2011)
Journal of Information Processing
, vol.19
-
-
Yoshioka, K.1
Hosobuchi, Y.2
Orii, T.3
Matsumoto, T.4
|