-
1
-
-
78649248594
-
-
free version
-
Avast antivirus, free version, http://www.avast.com
-
Avast Antivirus
-
-
-
2
-
-
84859304100
-
-
free version
-
Avira antivirus, free version, http://www.avira.com
-
Avira Antivirus
-
-
-
3
-
-
84859348337
-
-
IDA Pro, http://www.hex-rays.com/idapro/
-
IDA Pro
-
-
-
5
-
-
26444538294
-
Model checking x86 executables with CodeSurfer/x86 and WPDS++
-
Computer Aided Verification: 17th International Conference, CAV 2005. Proceedings
-
Balakrishnan, G., Reps, T., Kidd, N., Lal, A., Lim, J.,Melski, D., Gruian, R., Yong, S., Chen, C.-H., Teitelbaum, T.:Model Checking x86 Executables with CodeSurfer/x86 andWPDS++. In: Etessami, K., Rajamani, S.K. (eds.) CAV 2005. LNCS, vol. 3576, pp. 158-163. Springer, Heidelberg (2005) (Pubitemid 41431730)
-
(2005)
Lecture Notes in Computer Science
, vol.3576
, pp. 158-163
-
-
Balakrishnan, G.1
Reps, T.2
Kidd, N.3
Lal, A.4
Lim, J.5
Melski, D.6
Gruian, R.7
Yong, S.8
Chen, C.-H.9
Teitelbaum, T.10
-
6
-
-
34247166239
-
Static detection of malicious code in executable programs
-
Bergeron, J., Debbabi, M., Desharnais, J., Erhioui,M., Lavoie, Y., Tawbi, N.: Static detection of malicious code in executable programs. In: SREIS (2001)
-
(2001)
SREIS
-
-
Bergeron, J.1
Debbabi, M.2
Desharnais, J.3
Erhioui, M.4
Lavoie, Y.5
Tawbi, N.6
-
7
-
-
70349990723
-
Architecture of a Morphological Malware Detector
-
Bonfante, G., Kaczmarek, M., Marion, J.-Y.: Architecture of a Morphological Malware Detector. Journal in Computer Virology 5, 263-270 (2009)
-
(2009)
Journal in Computer Virology
, vol.5
, pp. 263-270
-
-
Bonfante, G.1
Kaczmarek, M.2
Marion, J.-Y.3
-
8
-
-
0026913667
-
Symbolic boolean manipulation with ordered binary-decision diagrams
-
Bryant, R.E.: Symbolic boolean manipulation with ordered binary-decision diagrams. ACM Comput. Surv. 24(3) (1992)
-
(1992)
ACM Comput. Surv.
, vol.24
, Issue.3
-
-
Bryant, R.E.1
-
11
-
-
27544433210
-
Semantics-aware malware detection
-
Christodorescu, M., Jha, S., Seshia, S.A., Song, D.X., Bryant, R.E.: Semantics-aware malware detection. In: IEEE Symposium on Security and Privacy (2005)
-
IEEE Symposium on Security and Privacy (2005)
-
-
Christodorescu, M.1
Jha, S.2
Seshia, S.A.3
Song, D.X.4
Bryant, R.E.5
-
12
-
-
0142121527
-
Model checking LTL with regular valuations for push-down systems
-
Esparza, J., Kucera, A., Schwoon, S.: Model checking LTL with regular valuations for push-down systems. Inf. Comput. 186(2) (2003)
-
(2003)
Inf. Comput.
, vol.186
, Issue.2
-
-
Esparza, J.1
Kucera, A.2
Schwoon, S.3
-
13
-
-
84958757867
-
A BDD-Based Model Checker for Recursive Programs
-
Computer Aided Verification
-
Esparza, J., Schwoon, S.: A BDD-Based Model Checker for Recursive Programs. In: Berry, G., Comon, H., Finkel, A. (eds.) CAV 2001. LNCS, vol. 2102, pp. 324-336. Springer, Heidelberg (2001) (Pubitemid 33312928)
-
(2001)
LECTURE NOTES IN COMPUTER SCIENCE
, Issue.2102
, pp. 324-336
-
-
Esparza, J.1
Schwoon, S.2
-
15
-
-
38449121202
-
Using Verification Technology to Specify and Detect Malware
-
Moreno Díaz, R., Pichler, F., Quesada Arencibia, A. (eds.) EUROCAST 2007 Springer, Heidelberg
-
Holzer, A., Kinder, J., Veith, H.: Using Verification Technology to Specify and Detect Malware. In: Moreno Díaz, R., Pichler, F., Quesada Arencibia, A. (eds.) EUROCAST 2007. LNCS, vol. 4739, pp. 497-504. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4739
, pp. 497-504
-
-
Holzer, A.1
Kinder, J.2
Veith, H.3
-
16
-
-
26444526878
-
Detecting malicious code by model checking
-
Detection of Instructions and Malware, and Vulnerability Assessment: Second International Conference, DIMVA 2005. Proceedings
-
Kinder, J., Katzenbeisser, S., Schallhart, C., Veith, H.: Detecting Malicious Code by Model Checking. In: Julisch, K., Krügel, C. (eds.) DIMVA 2005. LNCS, vol. 3548, pp. 174-187. Springer, Heidelberg (2005) (Pubitemid 41423155)
-
(2005)
Lecture Notes in Computer Science
, vol.3548
, pp. 174-187
-
-
Kinder, J.1
Katzenbeisser, S.2
Schallhart, C.3
Veith, H.4
-
17
-
-
78149427452
-
Proactive detection of computer worms using model checking
-
Kinder, J., Katzenbeisser, S., Schallhart, C., Veith, H.: Proactive detection of computer worms using model checking. IEEE Transactions on Dependable and Secure Computing 7(4) (2010)
-
(2010)
IEEE Transactions on Dependable and Secure Computing
, vol.7
, Issue.4
-
-
Kinder, J.1
Katzenbeisser, S.2
Schallhart, C.3
Veith, H.4
-
18
-
-
84859363174
-
Context-sensitive analysis of obfuscated x86 executables
-
Lakhotia, A., Boccardo, D.R., Singh, A., Manacero, A.: Context-sensitive analysis of obfuscated x86 executables. In: PEPM (2010)
-
(2010)
PEPM
-
-
Lakhotia, A.1
Boccardo, D.R.2
Singh, A.3
Manacero, A.4
-
19
-
-
33751120104
-
A method for detecting obfuscated calls in malicious binaries
-
Lakhotia, A., Kumar, E.U., Venable, M.: A method for detecting obfuscated calls in malicious binaries. IEEE Trans. Software Eng. 31(11) (2005)
-
(2005)
IEEE Trans. Software Eng.
, vol.31
, Issue.11
-
-
Lakhotia, A.1
Kumar, E.U.2
Venable, M.3
-
20
-
-
84946414079
-
Static verification of worm and virus behavior in binary executables using model checking
-
Singh, P.K., Lakhotia, A.: Static verification of worm and virus behavior in binary executables using model checking. In: IAW (2003)
-
(2003)
IAW
-
-
Singh, P.K.1
Lakhotia, A.2
-
21
-
-
80052873279
-
Efficient CTL Model-Checking for Pushdown Systems
-
Katoen, J.-P., König, B. (eds.) CONCUR 2011 Springer, Heidelberg
-
Song, F., Touili, T.: Efficient CTL Model-Checking for Pushdown Systems. In: Katoen, J.-P., König, B. (eds.) CONCUR 2011. LNCS, vol. 6901, pp. 434-449. Springer, Heidelberg (2011)
-
(2011)
LNCS
, vol.6901
, pp. 434-449
-
-
Song, F.1
Touili, T.2
|