-
3
-
-
84863103029
-
-
Accessed at January 10, 2012
-
J. Koret, "Zero wine," http://zerowine.sourceforge.net, (Accessed at January 10, 2012).
-
Zero Wine
-
-
Koret, J.1
-
4
-
-
84863107551
-
-
Accessed at January 9, 2012
-
T. Rudnai, "Crypto-analysis in shellcode detection," http://community.websense.com/blogs/securitylabs/archive/2010/06/03/ crypto-analysis-in-shellcode-detection.aspx, 2010, (Accessed at January 9, 2012).
-
(2010)
Crypto-analysis in Shellcode Detection
-
-
Rudnai, T.1
-
5
-
-
84863091341
-
-
Accessed at January 9,2012
-
D. Steven, "Xorsearch," http://blog.didierstevens.com/programs/ xorsearch/, 2010, (Accessed at January 9,2012).
-
(2010)
Xorsearch
-
-
Steven, D.1
-
6
-
-
63149120017
-
Using support vector machine to detect unknown computer viruses
-
B. Zhang, J. Yin, J. Hao, D. Zhang, and S. Wang, "Using support vector machine to detect unknown computer viruses," International Journal of Computational Intelligence Research, vol. 2, no. 1, pp. 100-104, 2006.
-
(2006)
International Journal of Computational Intelligence Research
, vol.2
, Issue.1
, pp. 100-104
-
-
Zhang, B.1
Yin, J.2
Hao, J.3
Zhang, D.4
Wang, S.5
-
7
-
-
81755176870
-
Computer virus detection using features ranking and machine learning
-
A. Altaher, S. Ramadass, and A. Ali, "Computer virus detection using features ranking and machine learning," Australian Journal of Basic and Applied Sciences, vol. 5, no. 9, pp. 1482-1486, 2011.
-
(2011)
Australian Journal of Basic and Applied Sciences
, vol.5
, Issue.9
, pp. 1482-1486
-
-
Altaher, A.1
Ramadass, S.2
Ali, A.3
-
8
-
-
77951112979
-
A system for analyzing advance bot behavior
-
Information Systems, Technology and Management, ser. S. K. Prasad, H. M. Vin, S. Sahni, M. P. Jaiswal, and B. Thipakorn, Eds. Springer Berlin Heidelberg
-
J. Oh, C. Im, and H. Jeong, "A system for analyzing advance bot behavior," in Information Systems, Technology and Management, ser. Communications in Computer and Information Science, S. K. Prasad, H. M. Vin, S. Sahni, M. P. Jaiswal, and B. Thipakorn, Eds. Springer Berlin Heidelberg, 2010, vol. 54, pp. 56-63.
-
(2010)
Communications in Computer and Information Science
, vol.54
, pp. 56-63
-
-
Oh, J.1
Im, C.2
Jeong, H.3
-
9
-
-
84924223669
-
Static analysis of executables to detect malicious patterns
-
USENIX Association. USENIX Association, Aug. [Online]. Available
-
M. Christodorescu and S. Jha, "Static analysis of executables to detect malicious patterns," in Proceedings of the 12th USENIX Security Symposium (Security'03), USENIX Association. USENIX Association, Aug. 2003, pp. 169-186. [Online]. Available: http://www.cs.wisc.edu/~mihai/mywork/papers/index. htmln#11
-
(2003)
Proceedings of the 12th USENIX Security Symposium (Security'03)
, pp. 169-186
-
-
Christodorescu, M.1
Jha, S.2
-
10
-
-
77951195685
-
Finding and extracting crypto routines from malware
-
F. Leder, P. Martini, and A. Wichmann, "Finding and extracting crypto routines from malware," in Performance Computing and Communications Conference (IPCCC), 2009 IEEE 28th International, 2009, pp. 394-401.
-
Performance Computing and Communications Conference (IPCCC), 2009 IEEE 28th International, 2009
, pp. 394-401
-
-
Leder, F.1
Martini, P.2
Wichmann, A.3
-
11
-
-
84856657341
-
Ensemble based categorization and adaptive model for malware detection
-
vol. 978-1-4577-2153-3
-
M. N. A. Zabidi, M. A. Maarof, and A. Zainal, "Ensemble based categorization and adaptive model for malware detection," 2011 7th International Conference on Information Assurance and Security (IAS), vol. 978-1-4577-2153-3, pp. 80-85, 2011.
-
(2011)
2011 7th International Conference on Information Assurance and Security (IAS)
, pp. 80-85
-
-
Zabidi, M.N.A.1
Maarof, M.A.2
Zainal, A.3
-
12
-
-
84867345538
-
-
October Accessed at January 11, 2012
-
M. N. A. Zabidi, "Compiling features for malicious software," http://conference.hitb.org/hitbsecconf2011kul/materials/D1%20SIGINT%20- %20Muhammad%20Najmi% 20Ahmad%20Zabidi%20-%20Compiling%20Features% 20for%20Malcious%20Binaries.pdf, October 2011, (Accessed at January 11, 2012).
-
(2011)
Compiling Features for Malicious Software
-
-
Zabidi, M.N.A.1
-
13
-
-
36549045048
-
Awe: Improving software analysis through modular integration of static and dynamic analyses
-
ACM
-
R. Brown, R. Khazan, and M. Zhivich, "Awe: Improving software analysis through modular integration of static and dynamic analyses," in Proceedings of the 7th ACM SIGPLANSIGSOFT workshop on Program analysis for software tools and engineering. ACM, 2007, pp. 69-74.
-
(2007)
Proceedings of the 7th ACM SIGPLANSIGSOFT Workshop on Program Analysis for Software Tools and Engineering
, pp. 69-74
-
-
Brown, R.1
Khazan, R.2
Zhivich, M.3
-
14
-
-
84863091343
-
-
March Accessed at January 11, 2012
-
Wikibooks, "X86 disassembly," http://en.wikibooks.org/wiki/X86 Disassembly/Debugger Detectors, March 2008, (Accessed at January 11, 2012).
-
(2008)
X86 Disassembly
-
-
-
15
-
-
34047129159
-
Using entropy analysis to find encrypted and packed malware
-
R. Lyda and J. Hamrock, "Using entropy analysis to find encrypted and packed malware," Security & Privacy, IEEE, vol. 5, no. 2, pp. 40-45, 2007.
-
(2007)
Security & Privacy, IEEE
, vol.5
, Issue.2
, pp. 40-45
-
-
Lyda, R.1
Hamrock, J.2
|