-
1
-
-
0004072686
-
-
Addison-Wesley Longman Boston
-
Aho AV, Sethi R, Ullman JD (1986) Compilers: principles, techniques, and tools. Addison-Wesley Longman, Boston
-
(1986)
Compilers: Principles, Techniques, and Tools
-
-
Aho, A.V.1
Sethi, R.2
Ullman, J.D.3
-
3
-
-
79960360109
-
Malware analysis with tree automata inference
-
Springer Berlin
-
Babić D, Reynaud D, Song D (2011) Malware analysis with tree automata inference. In: CAV'11: proceedings of the 23rd int conference on computer aided verification. Lecture notes in computer science, vol 6806. Springer, Berlin, pp 116-131
-
(2011)
CAV'11: Proceedings of the 23rd Int Conference on Computer Aided Verification Lecture Notes in Computer Science
, vol.6806
, pp. 116-131
-
-
Babić, D.1
Reynaud, D.2
Song, D.3
-
4
-
-
70349990723
-
Architecture of a morphological malware detector
-
10.1007/s11416-008-0102-4
-
G Bonfante M Kaczmarek J-Y Marion 2009 Architecture of a morphological malware detector J Comput Virol 5 263 270 10.1007/s11416-008-0102-4
-
(2009)
J Comput Virol
, vol.5
, pp. 263-270
-
-
Bonfante, G.1
Kaczmarek, M.2
Marion, J.-Y.3
-
5
-
-
84882738195
-
Automatically identifying trigger-based behavior in malware
-
Springer Berlin
-
Brumley D, Hartwig C, Zhenkai Liang JN, Song D, Yin H (2008) Automatically identifying trigger-based behavior in malware. In: Botnet detection countering the largest security threat. Advances in information security, vol 36. Springer, Berlin, pp 65-88
-
(2008)
Botnet Detection Countering the Largest Security Threat Advances in Information Security
, vol.36
, pp. 65-88
-
-
Brumley, D.1
Hartwig, C.2
Zhenkai Liang, J.N.3
Song, D.4
Yin, H.5
-
8
-
-
27544433210
-
Semantics-aware malware detection
-
IEEE Computer Society Press Los Alamitos
-
Christodorescu M, Jha S, Seshia SA, Song D, Bryant RE (2005) Semantics-aware malware detection. In: SP'05: proc of the 2005 IEEE symp. on security and privacy. IEEE Computer Society Press, Los Alamitos, pp 32-46
-
(2005)
SP'05: Proc of the 2005 IEEE Symp. on Security and Privacy
, pp. 32-46
-
-
Christodorescu, M.1
Jha, S.2
Seshia, S.A.3
Song, D.4
Bryant, R.E.5
-
12
-
-
21644482450
-
Minos: Control data attack prevention orthogonal to memory model
-
IEEE Press New York
-
Crandall J, Chong F (2005) Minos: control data attack prevention orthogonal to memory model. In: Proc of the 37th int symp on microarchitecture. IEEE Press, New York, pp 221-232
-
(2005)
Proc of the 37th Int Symp on Microarchitecture
, pp. 221-232
-
-
Crandall, J.1
Chong, F.2
-
13
-
-
0029716418
-
A sense of self for Unix processes
-
IEEE Computer Society Press Los Alamitos. 10.1109/SECPRI.1996.502675
-
Forrest S, Hofmeyr SA, Somayaji A, Longstaff TA (1996) A sense of self for Unix processes. In: Proc of the 1996 IEEE symp on security and privacy. IEEE Computer Society Press, Los Alamitos, pp 120-129
-
(1996)
Proc of the 1996 IEEE Symp on Security and Privacy
, pp. 120-129
-
-
Forrest, S.1
Hofmeyr, S.A.2
Somayaji, A.3
Longstaff, T.A.4
-
14
-
-
77955210614
-
Synthesizing near-optimal malware specifications from suspicious behaviors
-
IEEE Computer Society Press Los Alamitos. 10.1109/SP.2010.11
-
Fredrikson M, Jha S, Christodorescu M, Sailer R, Yan X (2010) Synthesizing near-optimal malware specifications from suspicious behaviors. In: Proc of the 2010 IEEE symposium on security and privacy. IEEE Computer Society Press, Los Alamitos, pp 45-60
-
(2010)
Proc of the 2010 IEEE Symposium on Security and Privacy
, pp. 45-60
-
-
Fredrikson, M.1
Jha, S.2
Christodorescu, M.3
Sailer, R.4
Yan, X.5
-
15
-
-
0006776326
-
-
Technical report, Dept. Syst. Inform. Comput., Univ. Politecnica Valencia, Valencia, Spain
-
García P (1993) Learning k-testable tree sets from positive data. Technical report, Dept. Syst. Inform. Comput., Univ. Politecnica Valencia, Valencia, Spain
-
(1993)
Learning K-testable Tree Sets from Positive Data
-
-
García, P.1
-
16
-
-
0025484018
-
Inference of k-testable languages in the strict sense and application to syntactic pattern recognition
-
10.1109/34.57687
-
P García E Vidal 1990 Inference of k-testable languages in the strict sense and application to syntactic pattern recognition IEEE Trans Pattern Anal Mach Intell 12 920 925 10.1109/34.57687
-
(1990)
IEEE Trans Pattern Anal Mach Intell
, vol.12
, pp. 920-925
-
-
García, P.1
Vidal, E.2
-
18
-
-
0001187706
-
Complexity of automaton identification from given data
-
495194 0376.68041 10.1016/S0019-9958(78)90562-4
-
EM Gold 1978 Complexity of automaton identification from given data Inf Control 37 3 302 320 495194 0376.68041 10.1016/S0019-9958(78)90562-4
-
(1978)
Inf Control
, vol.37
, Issue.3
, pp. 302-320
-
-
Gold, E.M.1
-
19
-
-
38449121202
-
Using verification technology to specify and detect malware
-
Springer Berlin
-
Holzer A, Kinder J, Veith H (2007) Using verification technology to specify and detect malware. In: Lecture notes in computer science, vol 4739. Springer, Berlin, pp 497-504
-
(2007)
Lecture Notes in Computer Science
, vol.4739
, pp. 497-504
-
-
Holzer, A.1
Kinder, J.2
Veith, H.3
-
20
-
-
84866721423
-
DTA++: Dynamic taint analysis with targeted control-flow propagation
-
Kang MG, McCamant S, Poosankam P, Song D (2011) DTA++: dynamic taint analysis with targeted control-flow propagation. In: Proceedings of the 18th annual network and distributed system security symposium, San Diego, CA
-
(2011)
Proceedings of the 18th Annual Network and Distributed System Security Symposium San Diego, CA
-
-
Kang, M.G.1
McCamant, S.2
Poosankam, P.3
Song, D.4
-
22
-
-
26444526878
-
Detecting malicious code by model checking
-
K. Julisch C. Krügel (eds). Springer Berlin. 10.1007/11506881-11
-
Kinder J, Katzenbeisser S, Schallhart C, Veith H (2005) Detecting malicious code by model checking. In: Julisch K, Krügel C (eds) GI SIG SIDAR conference on detection of intrusions and malware and vulnerability assessment. Lecture notes in computer science, vol 3548. Springer, Berlin, pp 174-187
-
(2005)
GI SIG SIDAR Conference on Detection of Intrusions and Malware and Vulnerability Assessment Lecture Notes in Computer Science
, vol.3548
, pp. 174-187
-
-
Kinder, J.1
Katzenbeisser, S.2
Schallhart, C.3
Veith, H.4
-
23
-
-
0016971687
-
Symbolic execution and program testing
-
0329.68018 10.1145/360248.360252
-
JC King 1976 Symbolic execution and program testing Commun ACM 19 7 385 394 0329.68018 10.1145/360248.360252
-
(1976)
Commun ACM
, vol.19
, Issue.7
, pp. 385-394
-
-
King, J.C.1
-
25
-
-
85076206522
-
Effective and efficient malware detection at the end host
-
Kolbitsch C, Milani P, Kruegel C, Kirda E, Zhou X, Wang X (2009) Effective and efficient malware detection at the end host. In: The 18th USENIX security symposium
-
(2009)
The 18th USENIX Security Symposium
-
-
Kolbitsch, C.1
Milani, P.2
Kruegel, C.3
Kirda, E.4
Zhou, X.5
Wang, X.6
-
26
-
-
3442887990
-
Inference of reversible tree languages
-
10.1109/TSMCB.2004.827190
-
D López JM Sempere P García 2004 Inference of reversible tree languages IEEE Trans Syst Man Cybern, Part B, Cybern 34 4 1658 1665 10.1109/TSMCB.2004.827190
-
(2004)
IEEE Trans Syst Man Cybern, Part B, Cybern
, vol.34
, Issue.4
, pp. 1658-1665
-
-
López, D.1
Sempere, J.M.2
García, P.3
-
27
-
-
33745304805
-
Pin: Building customized program analysis tools with dynamic instrumentation
-
ACM Press New York
-
Luk C, Cohn R, Muth R, Patil H, Klauser A, Lowney G, Wallace S, Reddi V, Hazelwood K (2005) Pin: building customized program analysis tools with dynamic instrumentation. In: PLDI'05: proc of the 2005 ACM SIGPLAN conf on prog lang design and impl. ACM Press, New York, pp 190-200
-
(2005)
PLDI'05: Proc of the 2005 ACM SIGPLAN Conf on Prog Lang Design and Impl
, pp. 190-200
-
-
Luk, C.1
Cohn, R.2
Muth, R.3
Patil, H.4
Klauser, A.5
Lowney, G.6
Wallace, S.7
Reddi, V.8
Hazelwood, K.9
-
30
-
-
34548737161
-
Exploring multiple execution paths for malware analysis
-
IEEE Computer Society Press Los Alamitos
-
Moser A, Kruegel C, Kirda E (2007) Exploring multiple execution paths for malware analysis. In: SP'07: proc of the 2007 IEEE symposium on security and privacy, Washington, DC, USA. IEEE Computer Society Press, Los Alamitos, pp 231-245
-
(2007)
SP'07: Proc of the 2007 IEEE Symposium on Security and Privacy Conf. Event. Location Washington, DC, USA
, pp. 231-245
-
-
Moser, A.1
Kruegel, C.2
Kirda, E.3
-
31
-
-
27544444280
-
Dynamic taint analysis: Automatic detection, analysis, and signature generation of exploit attacks on commodity software
-
Newsome J, Song D (2005) Dynamic taint analysis: automatic detection, analysis, and signature generation of exploit attacks on commodity software. In: Proc of the network and distributed systems security symposium
-
(2005)
Proc of the Network and Distributed Systems Security Symposium
-
-
Newsome, J.1
Song, D.2
-
32
-
-
12844267418
-
Secure program execution via dynamic information flow tracking
-
10.1145/1037949.1024404
-
G Suh J Lee D Zhang S Devadas 2004 Secure program execution via dynamic information flow tracking Oper Syst Rev 38 5 85 96 10.1145/1037949.1024404
-
(2004)
Oper Syst Rev
, vol.38
, Issue.5
, pp. 85-96
-
-
Suh, G.1
Lee, J.2
Zhang, D.3
Devadas, S.4
-
35
-
-
0038011184
-
Mimicry attacks on host-based intrusion detection systems
-
ACM Press New York. 10.1145/586110.586145
-
Wagner D, Soto P (2002) Mimicry attacks on host-based intrusion detection systems. In: CCS'02: proc of the 9th ACM conf on comp and comm security. ACM Press, New York, pp 255-264
-
(2002)
CCS'02: Proc of the 9th ACM Conf on Comp and Comm Security
, pp. 255-264
-
-
Wagner, D.1
Soto, P.2
-
37
-
-
0012883458
-
Locally testable languages
-
307538 0242.68038 10.1016/S0022-0000(72)80020-5
-
Y Zalcstein 1972 Locally testable languages J Comput Syst Sci 6 2 151 167 307538 0242.68038 10.1016/S0022-0000(72)80020-5
-
(1972)
J Comput Syst Sci
, vol.6
, Issue.2
, pp. 151-167
-
-
Zalcstein, Y.1
|