-
1
-
-
84870565251
-
-
Process monitor. http://technet.microsoft.com/en-us/sysinternals/ bb896645.aspx.
-
Process Monitor
-
-
-
2
-
-
84863055987
-
-
Putty. http://www.chiark.greenend.org.uk/∼sgtatham/putty/.
-
Putty
-
-
-
3
-
-
84863080356
-
-
Qemu. http://bellard.org/qemu/.
-
Qemu
-
-
-
4
-
-
33750543292
-
-
Red pill. http://invisiblethings.org/papers/redpill.html.
-
Red Pill
-
-
-
5
-
-
84863046446
-
-
Scoopyng. http://www.trapkit.de/research/vmm/scoopydoo/index.html.
-
Scoopyng
-
-
-
7
-
-
84863079354
-
-
Vmware. https://www.vmware.com.
-
Vmware
-
-
-
8
-
-
84872113696
-
Efficient detection of split personalities in malware
-
D. Balzarotti, M. Cova, C. Karlberger, C. Kruegel, E. Kirda, and G. Vigna. Efficient detection of split personalities in malware. In NDSS 2010, 17th Annual Network and Distributed System Security Symposium, 2010.
-
(2010)
NDSS 2010, 17th Annual Network and Distributed System Security Symposium
-
-
Balzarotti, D.1
Cova, M.2
Karlberger, C.3
Kruegel, C.4
Kirda, E.5
Vigna, G.6
-
10
-
-
58449115871
-
Bitscope: Automatically dissecting malicious binaries
-
D. Brumley, C. Hartwig, M. G. Kang, Z. Liang, J. Newsome, P. Poosankam, D. Song, and H. Yin. Bitscope: Automatically dissecting malicious binaries. Technical report, In CMU-CS-07-133, 2007.
-
(2007)
Technical Report, in CMU-CS-07-133
-
-
Brumley, D.1
Hartwig, C.2
Kang, M.G.3
Liang, Z.4
Newsome, J.5
Poosankam, P.6
Song, D.7
Yin, H.8
-
11
-
-
53349116756
-
Towards an understanding of anti-virtualization and anti-debugging behavior in modern malware
-
X. Chen, J. Andersen, Z. M. Mao, M. Bailey, and J. Nazario. Towards an understanding of anti-virtualization and anti-debugging behavior in modern malware. In Dependable Systems and Networks, pages 177-186, 2008.
-
(2008)
Dependable Systems and Networks
, pp. 177-186
-
-
Chen, X.1
Andersen, J.2
Mao, Z.M.3
Bailey, M.4
Nazario, J.5
-
12
-
-
84863056604
-
Anti-emulation through time-lock puzzles
-
Hoofddorp, Netherlands, May
-
T. Ebringer. Anti-emulation through time-lock puzzles. In Second International CARO Workshop, Hoofddorp, Netherlands, May 2008.
-
(2008)
Second International CARO Workshop
-
-
Ebringer, T.1
-
13
-
-
84903607772
-
Dynamic spyware analysis
-
pages 18:1- 18:14, Berkeley, CA, USA, USENIX Association
-
M. Egele, C. Kruegel, E. Kirda, H. Yin, and D. Song. Dynamic spyware analysis. In 2007 USENIX Annual Technical Conference on Proceedings of the USENIX Annual Technical Conference, pages 18:1- 18:14, Berkeley, CA, USA, 2007. USENIX Association.
-
(2007)
2007 USENIX Annual Technical Conference on Proceedings of the USENIX Annual Technical Conference
-
-
Egele, M.1
Kruegel, C.2
Kirda, E.3
Yin, H.4
Song, D.5
-
16
-
-
33745665056
-
Behavioral distance for intrusion detection
-
Recent Advances in Intrusion Detection - 8th International Symposium, RAID 2005, Revised Papers
-
D. Gao, M. K. Reiter, and D. Song. Behavioral distance for intrusion detection. In Proceedings of the 8th International Symposium on Recent Advances in Intrusion Detection (RAID2005), pages 63-81, 2005. (Pubitemid 43973722)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.3858 LNCS
, pp. 63-81
-
-
Gao, D.1
Reiter, M.K.2
Song, D.3
-
17
-
-
70349448915
-
Renovo: A hidden code extractor for packed executables
-
New York, NY, USA, ACM
-
M. G. Kang, P. Poosankam, and H. Yin. Renovo: a hidden code extractor for packed executables. In Proceedings of the 2007 ACM workshop on Recurring malcode, WORM'07, pages 46-53, New York, NY, USA, 2007. ACM.
-
(2007)
Proceedings of the 2007 ACM Workshop on Recurring Malcode, WORM'07
, pp. 46-53
-
-
Kang, M.G.1
Poosankam, P.2
Yin, H.3
-
18
-
-
74049124856
-
Emulating emulation-resistant malware
-
New York, NY, USA, ACM
-
M. G. Kang, H. Yin, S. Hanna, S. McCamant, and D. Song. Emulating emulation-resistant malware. In Proceedings of the 1st ACM workshop on Virtual machine security, VMSec'09, pages 11-22, New York, NY, USA, 2009. ACM.
-
(2009)
Proceedings of the 1st ACM Workshop on Virtual Machine Security, VMSec'09
, pp. 11-22
-
-
Kang, M.G.1
Yin, H.2
Hanna, S.3
McCamant, S.4
Song, D.5
-
19
-
-
12344266149
-
Operating system support for virtual machines
-
Berkeley, CA, USA, USENIX Association
-
S. T. King, G. W. Dunlap, and P. M. Chen. Operating system support for virtual machines. In Proceedings of the annual conference on USENIX Annual Technical Conference, pages 6-6, Berkeley, CA, USA, 2003. USENIX Association.
-
(2003)
Proceedings of the Annual Conference on USENIX Annual Technical Conference
, pp. 6-6
-
-
King, S.T.1
Dunlap, G.W.2
Chen, P.M.3
-
20
-
-
0001116877
-
Binary codes capable of correcting deletions, insertions and reversals
-
V. Levenshtein. Binary Codes Capable of Correcting Deletions, Insertions and Reversals. Soviet Physics Doklady, 10:707, 1966.
-
(1966)
Soviet Physics Doklady
, vol.10
, pp. 707
-
-
Levenshtein, V.1
-
22
-
-
38149030181
-
Detecting system emulators
-
J. A. Garay, A. K. Lenstra, M. Mambo, and R. Peralta, editors, Volume 4779 of Lecture Notes in Computer Science, Springer
-
T. Raffetseder, C. Krgel, and E. Kirda. Detecting system emulators. In J. A. Garay, A. K. Lenstra, M. Mambo, and R. Peralta, editors, ISC, volume 4779 of Lecture Notes in Computer Science, pages 1-18. Springer, 2007.
-
(2007)
ISC
, pp. 1-18
-
-
Raffetseder, T.1
Krgel, C.2
Kirda, E.3
-
23
-
-
85084161596
-
Analysis of the intel pentium's ability to support a secure virtual machine monitor
-
Berkeley, CA, USA, USENIX Association
-
J. S. Robin and C. E. Irvine. Analysis of the intel pentium's ability to support a secure virtual machine monitor. In Proceedings of the 9th conference on USENIX Security Symposium - Volume 9, pages 10-10, Berkeley, CA, USA, 2000. USENIX Association.
-
(2000)
Proceedings of the 9th Conference on USENIX Security Symposium
, vol.9
, pp. 10-10
-
-
Robin, J.S.1
Irvine, C.E.2
|