-
1
-
-
78049387622
-
A Layered Architecture for Detecting Malicious Behaviors
-
Martignoni, L., Stinson, E., Fredrikson, M., Jha, S., Mitchell, J. C.: A Layered Architecture for Detecting Malicious Behaviors. In: Proceedings of the 11th international Symposium on Recent Advances in intrusion Detection (RAID'08) (2008).
-
(2008)
Proceedings of the 11th International Symposium On Recent Advances In Intrusion Detection (RAID'08)
-
-
Martignoni, L.1
Stinson, E.2
Fredrikson, M.3
Jha, S.4
Mitchell, J.C.5
-
3
-
-
27544433210
-
Semantics-Aware Malware Detection
-
Christodorescu, M., Jha, S., Seshia, S., Song, D., Bryant, R.: Semantics-Aware Malware Detection. In: Proceedings of IEEE Symposium on Security and Privacy (2005).
-
(2005)
Proceedings of IEEE Symposium On Security and Privacy
-
-
Christodorescu, M.1
Jha, S.2
Seshia, S.3
Song, D.4
Bryant, R.5
-
6
-
-
34249847782
-
Formalisation and implementation aspects of k-ary (malicious) codes
-
(EICAR 2007 Best Academic Papers)
-
Filiol, E.: Formalisation and implementation aspects of k-ary (malicious) codes. J. Comput. Virol. 3(3), 75-86 (2007) (EICAR 2007 Best Academic Papers).
-
(2007)
J. Comput. Virol
, vol.3
, Issue.3
, pp. 75-86
-
-
Filiol, E.1
-
8
-
-
85076206522
-
Effective and Efficient Malware Detection at the End Host
-
Kolbitsch, C., Comparetti, P.M., Kruegel, C., Kirda, E., Zhou, X., Wang, X.: Effective and Efficient Malware Detection at the End Host. In: Proceedings of 18th USENIX Security Symposium (2009).
-
(2009)
Proceedings of 18th USENIX Security Symposium
-
-
Kolbitsch, C.1
Comparetti, P.M.2
Kruegel, C.3
Kirda, E.4
Zhou, X.5
Wang, X.6
-
10
-
-
84876307879
-
On the power of simple branch prediction analysis
-
Aciiçmez, O., Koç, Ç.K., Seifert, J.: On the power of simple branch prediction analysis. In: Proceedings of the 2nd ACM Symposium on information, Computer and Communications Security (ASIACCS' 07) (2007).
-
(2007)
Proceedings of the 2nd ACM Symposium On Information, Computer and Communications Security (ASIACCS' 07)
-
-
Aciiçmez, O.1
Koç, C.K.2
Seifert, J.3
-
11
-
-
84990479742
-
An efficient heuristic procedure for partition graphs
-
Kernighan, B.W., Lin, S.: An efficient heuristic procedure for partition graphs. Bell Syst. Tech. J. 49, 291-307 (1970).
-
(1970)
Bell Syst. Tech. J
, vol.49
, pp. 291-307
-
-
Kernighan, B.W.1
Lin, S.2
-
13
-
-
84860614597
-
-
Anubis
-
Anubis. http://anubis.iseclab.org/.
-
-
-
-
14
-
-
0017996760
-
Time, clocks, and the ordering of events in a distributed system
-
Lamport, L.: Time, clocks, and the ordering of events in a distributed system. Commun. ACM 21(7), 558-565 (1978).
-
(1978)
Commun. ACM
, vol.21
, Issue.7
, pp. 558-565
-
-
Lamport, L.1
-
15
-
-
33947629208
-
Provenance-Aware Tracing ofWorm Break-in and Contaminations: A Process Coloring Approach
-
Jiang, X., Walters, A., Buchholz, F., Xu, D., Wang, Y.M., Spafford, E.H.: Provenance-Aware Tracing ofWorm Break-in and Contaminations: A Process Coloring Approach. In: Proceedings of 26th IEEE Int'lConf.Distributed Computing Systems (ICDCS'06) (2006).
-
(2006)
Proceedings of 26th IEEE Int'lConf.Distributed Computing Systems (ICDCS'06)
-
-
Jiang, X.1
Walters, A.2
Buchholz, F.3
Xu, D.4
Wang, Y.M.5
Spafford, E.H.6
-
17
-
-
77950788046
-
Panorama: Capturing system-wide information flowformalware detection and analysis
-
Yin, H., Song, D., Manuel, E., Kruegel, C., Kirda, E.: Panorama: Capturing system-wide information flowformalware detection and analysis. In: Proceedings of the 14th ACM Conferences on Computer and Communication Security (2007).
-
(2007)
Proceedings of the 14th ACM Conferences On Computer and Communication Security
-
-
Yin, H.1
Song, D.2
Manuel, E.3
Kruegel, C.4
Kirda, E.5
-
19
-
-
85077680022
-
Behavior- based Spyware Detection
-
Kirda, E., Kruegel, C., Banks, G., Vigna, G., Kemmerer, R.: Behavior- based Spyware Detection. In: Proceedings of the USENIX Security Symposium (2006).
-
(2006)
Proceedings of the USENIX Security Symposium
-
-
Kirda, E.1
Kruegel, C.2
Banks, G.3
Vigna, G.4
Kemmerer, R.5
-
20
-
-
0023294949
-
Computer viruses: Theory and experiments
-
Cohen, F.: Computer viruses: theory and experiments. Comput. Secur. 6(1), 22-35 (1987).
-
(1987)
Comput. Secur
, vol.6
, Issue.1
, pp. 22-35
-
-
Cohen, F.1
-
21
-
-
84860615754
-
-
Phoenix
-
Phoenix. https://connect.microsoft.com/Phoenix.
-
-
-
-
22
-
-
70349141059
-
On the limits of information flowtechniques for malware analysis and containment
-
Cavallaro, L., Saxena, P., Sekar, R.: On the limits of information flowtechniques for malware analysis and containment. In: Proceedings of 5th international conference on Detection of Intrusions and Malware, and Vulnerability Assessment (2008).
-
(2008)
Proceedings of 5th International Conference On Detection of Intrusions and Malware, and Vulnerability Assessment
-
-
Cavallaro, L.1
Saxena, P.2
Sekar, R.3
-
24
-
-
0027961889
-
Self-Nonself Discrimination in a Computer
-
Forrest, S., Perelson, A.S., Allen, L., Cherukuri, R., Self-Nonself Discrimination in a Computer. In: Proceedings of IEEE Symposium on Security & Privacy (1994).
-
(1994)
Proceedings of IEEE Symposium On Security & Privacy
-
-
Forrest, S.1
Perelson, A.S.2
Allen, L.3
Cherukuri, R.4
-
27
-
-
85077528077
-
Automating mimicry attacks using static binary analysis
-
Kruegel, C., Kirda, E., Mutz, D., Robertson, W., Vigna, G.: Automating mimicry attacks using static binary analysis. In: Proceedings of the 14th conference on USENIX Security Symposium (2005).
-
(2005)
Proceedings of the 14th Conference On USENIX Security Symposium
-
-
Kruegel, C.1
Kirda, E.2
Mutz, D.3
Robertson, W.4
Vigna, G.5
-
28
-
-
84860620384
-
-
Norman Sandbox Whitepaper
-
Norman Sandbox Whitepaper. http://www.norman.com.
-
-
-
-
30
-
-
70450279044
-
Learning and Classification of Malware Behavior
-
Rieck, K., Holz, T., Willems, C., Düssel, P., Laskov, P.: Learning and Classification of Malware Behavior. In: Proceedings of Detection of Intrusions and Malware, and Vulnerability Assessment (2008).
-
(2008)
Proceedings of Detection of Intrusions and Malware, and Vulnerability Assessment
-
-
Rieck, K.1
Holz, T.2
Willems, C.3
Düssel, P.4
Laskov, P.5
-
31
-
-
33646805500
-
Cache missing for fun and profit
-
Percival, C.: Cache missing for fun and profit. BSDCan (2005). http://www.daemonology.net/hyperthreading-consideredharmful/.
-
(2005)
BSDCan
-
-
Percival, C.1
-
32
-
-
0347215214
-
UNIX Network Programming
-
2nd edn, Prentice Hall, Englewood Cliffs
-
Stevens, R.: UNIX Network Programming, 2nd edn. Interprocess Communications, vol. 2. Prentice Hall, Englewood Cliffs (1999).
-
(1999)
Interprocess Communications
, vol.2
-
-
Stevens, R.1
-
34
-
-
48349087890
-
Code obfuscation techniques for metamorphic viruses
-
doi:10.1007/s11416-008-0084-2
-
Borello, J., Mé, L.: Code obfuscation techniques for metamorphic viruses. J. Comput.Virol. 4, 211-220 (2008). doi:10.1007/s11416-008-0084-2.
-
(2008)
J. Comput.Virol
, vol.4
, pp. 211-220
-
-
Borello, J.1
Mé, L.2
|