-
1
-
-
84872303584
-
-
adore-ng
-
adore-ng. adore-ng rootkit. http://stealth.openwall.net/rootkits/.
-
Adore-ng Rootkit
-
-
-
2
-
-
84863355266
-
-
anubis
-
anubis. Anubis: Analyzing Unknown Binaries. http://anubis.iseclab.org/.
-
-
-
-
3
-
-
84872113696
-
Efficient Detection of Split Personalities in Malware
-
D. Balzarotti, M. Cova, C. Karlberger, C. Kruegel, E. Kirda, and G. Vigna. Efficient Detection of Split Personalities in Malware. In Proceedings of the Network and Distributed System Security Symposium (NDSS), San Diego, CA, February 2010.
-
Proceedings of the Network and Distributed System Security Symposium (NDSS), San Diego, CA, February 2010
-
-
Balzarotti, D.1
Cova, M.2
Karlberger, C.3
Kruegel, C.4
Kirda, E.5
Vigna, G.6
-
4
-
-
85043201839
-
Scalable, behavior-based malware clustering
-
U. Bayer, P. Comparetti, C. Hlauschek, C. Kruegel, and E. Kirda. Scalable, behavior-based malware clustering. In Proceedings of the 16th Annual Network and Distributed System Security Symposium (NDSS 2009), 2009.
-
Proceedings of the 16th Annual Network and Distributed System Security Symposium (NDSS 2009), 2009
-
-
Bayer, U.1
Comparetti, P.2
Hlauschek, C.3
Kruegel, C.4
Kirda, E.5
-
8
-
-
74049095923
-
Dispatcher: Enabling active botnet infiltration using automatic protocol reverse-engineering
-
J. Caballero, P. Poosankam, C. Kreibich, and D. Song. Dispatcher: Enabling active botnet infiltration using automatic protocol reverse-engineering. In Proceedings of the 16th ACM Conference on Computer and Communication Security (CCS'09), Chicago, IL, Nov. 2009.
-
Proceedings of the 16th ACM Conference on Computer and Communication Security (CCS'09), Chicago, IL, Nov. 2009
-
-
Caballero, J.1
Poosankam, P.2
Kreibich, C.3
Song, D.4
-
9
-
-
85025141365
-
Binary code extraction and interface identification for security applications
-
J. Caballero, N. M. Johnson, S. McCamant, and D. Song. Binary code extraction and interface identification for security applications. In Proceedings of the 17th Annual Network and Distributed System Security Symposium (NDSS'10), San Diego, CA, Feb. 2010.
-
Proceedings of the 17th Annual Network and Distributed System Security Symposium (NDSS'10), San Diego, CA, Feb. 2010
-
-
Caballero, J.1
Johnson, N.M.2
McCamant, S.3
Song, D.4
-
13
-
-
70349240080
-
Ether: Malware analysis via hardware virtualization extensions
-
A. Dinaburg, P. Royal, M. Sharif, andW. Lee. Ether: malware analysis via hardware virtualization extensions. In Proceedings of the 15th ACM Conference on Computer and Communications Security, pages 51-62, 2008.
-
(2008)
Proceedings of the 15th ACM Conference on Computer and Communications Security
, pp. 51-62
-
-
Dinaburg, A.1
Royal, P.2
Sharif, M.3
Lee, W.4
-
14
-
-
84978401615
-
Revirt: Enabling intrusion analysis through virtual-machine logging and replay
-
G. W. Dunlap, S. T. King, S. Cinar, M. A. Basrai, and P. M. Chen. Revirt: Enabling intrusion analysis through virtual-machine logging and replay. In Proceedings of the 5th symposium on Operating Systems Design and Implementation (OSDI'02), December 2002.
-
Proceedings of the 5th Symposium on Operating Systems Design and Implementation (OSDI'02), December 2002
-
-
Dunlap, G.W.1
King, S.T.2
Cinar, S.3
Basrai, M.A.4
Chen, P.M.5
-
15
-
-
84903607772
-
Dynamic Spyware Analysis
-
M. Egele, C. Kruegel, E. Kirda, H. Yin, and D. Song. Dynamic Spyware Analysis. In Proceedings of the 2007 Usenix Annual Technical Conference (ATC'07), June 2007.
-
Proceedings of the 2007 Usenix Annual Technical Conference (ATC'07), June 2007
-
-
Egele, M.1
Kruegel, C.2
Kirda, E.3
Yin, H.4
Song, D.5
-
16
-
-
38349023177
-
Attacks on virtual machine emulators
-
December
-
P. Ferrie. Attacks on virtual machine emulators. Symantec Security Response, December 2006.
-
(2006)
Symantec Security Response
-
-
Ferrie, P.1
-
18
-
-
85077336773
-
Replay debugging for distributed applications
-
D. Geels, G. Altekar, S. Shenker, and I. Stoica. Replay debugging for distributed applications. In Proceedings of the 2006 USENIX Annual Technical Conference (ATC'06), pages 27-27, 2006.
-
(2006)
Proceedings of the 2006 USENIX Annual Technical Conference (ATC'06)
, pp. 27-27
-
-
Geels, D.1
Altekar, G.2
Shenker, S.3
Stoica, I.4
-
19
-
-
85076895639
-
R2: An application-level kernel for record and replay
-
Z. Guo, X.Wang, J. Tang, X. Liu, Z. Xu, M.Wu, M. F. Kaashoek, and Z. Zhang. R2: An application-level kernel for record and replay. In Proceedings of the 9th Symposium on Operating Systems Design and Implementation (OSDI'08), pages 193-208, 2008.
-
(2008)
Proceedings of the 9th Symposium on Operating Systems Design and Implementation (OSDI'08)
, pp. 193-208
-
-
Guo, Z.1
Wang, X.2
Tang, J.3
Liu, X.4
Xu, Z.5
Wu, M.6
Kaashoek, M.F.7
Zhang, Z.8
-
22
-
-
74049124856
-
Emulating emulation-resistant malware
-
M. G. Kang, H. Yin, S. Hanna, S. McCamant, and D. Song. Emulating emulation-resistant malware. In Proceedings of the 2nd Workshop on Virtual Machine Security (VMSec'09), November 2009.
-
Proceedings of the 2nd Workshop on Virtual Machine Security (VMSec'09), November 2009
-
-
Kang, M.G.1
Yin, H.2
Hanna, S.3
McCamant, S.4
Song, D.5
-
23
-
-
84863355040
-
-
kvm. Kernel Based Virtual Machine. http://www.linux-kvm.org/.
-
-
-
-
25
-
-
31944440969
-
Pin: Building customized program analysis tools with dynamic instrumentation
-
C.-K. Luk, R. Cohn, R. Muth, H. Patil, A. Klauser, G. Lowney, S.Wallace, V. J. Reddi, and K. Hazelwood. Pin: Building customized program analysis tools with dynamic instrumentation. In Proceedings of the 2005 ACM SIGPLAN conference on Programming Language Design and Implementation (PLDI'05), june 2005.
-
Proceedings of the 2005 ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI'05), June 2005
-
-
Luk, C.-K.1
Cohn, R.2
Muth, R.3
Patil, H.4
Klauser, A.5
Lowney, G.6
Wallace, S.7
Reddi, V.J.8
Hazelwood, K.9
-
26
-
-
85008257023
-
Testing cpu emulators
-
L. Martignoni, R. Paleari, G. F. Roglia, and D. Bruschi. Testing cpu emulators. In Proceedings of the 18th International Symposium on Software Testing and Analysis (ISSTA'09), pages 261-272, 2009.
-
(2009)
Proceedings of the 18th International Symposium on Software Testing and Analysis (ISSTA'09)
, pp. 261-272
-
-
Martignoni, L.1
Paleari, R.2
Roglia, G.F.3
Bruschi, D.4
-
30
-
-
84863355041
-
-
Qemu
-
qemulink. Qemu. http://fabrice.bellard.free.fr/qemu/.
-
Qemulink
-
-
-
34
-
-
70449644479
-
Automatic reverse engineering of malware emulators
-
M. Sharif, A. Lanzi, J. Giffin, and W. Lee. Automatic reverse engineering of malware emulators. In Proceedings of the 30th IEEE Symposium on Security and Privacy (Oakland'09), pages 94-109, 2009.
-
(2009)
Proceedings of the 30th IEEE Symposium on Security and Privacy (Oakland'09)
, pp. 94-109
-
-
Sharif, M.1
Lanzi, A.2
Giffin, J.3
Lee, W.4
-
39
-
-
84863391482
-
-
Vmware
-
vmware. Vmware. http://www.vmware.com/.
-
-
-
-
40
-
-
77950788046
-
Panorama: Capturing system-wide information flow for malware detection and analysis
-
H. Yin, D. Song, E. Manuel, C. Kruegel, and E. Kirda. Panorama: Capturing system-wide information flow for malware detection and analysis. In Proceedings of the 14th ACM Conference on Computer and Communication Security (CCS'07), October 2007.
-
Proceedings of the 14th ACM Conference on Computer and Communication Security (CCS'07), October 2007
-
-
Yin, H.1
Song, D.2
Manuel, E.3
Kruegel, C.4
Kirda, E.5
|