-
1
-
-
84865960220
-
-
Version 6.0.1367
-
Avast. Free avast antivirus, http://www.avast.com, Version 6.0.1367
-
Free Avast Antivirus
-
-
-
2
-
-
84865963365
-
-
Version 12.0.0.849
-
Avira, http://www.avira.com, Version 12.0.0.849
-
-
-
-
3
-
-
79960360109
-
Malware Analysis with Tree Automata Inference
-
Gopalakrishnan, G., Qadeer, S. (eds.) CAV 2011. Springer, Heidelberg
-
Babić, D., Reynaud, D., Song, D.: Malware Analysis with Tree Automata Inference. In: Gopalakrishnan, G., Qadeer, S. (eds.) CAV 2011. LNCS, vol. 6806, pp. 116-131. Springer, Heidelberg (2011)
-
(2011)
LNCS
, vol.6806
, pp. 116-131
-
-
Babić, D.1
Reynaud, D.2
Song, D.3
-
4
-
-
26444538294
-
Model Checking x86 Executables with CodeSurfer/x86 and WPDS++
-
Etessami, K., Rajamani, S.K. (eds.) CAV 2005. Springer, Heidelberg
-
Balakrishnan, G., Reps, T., Kidd, N., Lal, A., Lim, J.,Melski, D., Gruian, R., Yong, S., Chen, C.-H., Teitelbaum, T.:Model Checking x86 Executables with CodeSurfer/x86 and WPDS++. In: Etessami, K., Rajamani, S.K. (eds.) CAV 2005. LNCS, vol. 3576, pp. 158-163. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3576
, pp. 158-163
-
-
Balakrishnan, G.1
Reps, T.2
Kidd, N.3
Lal, A.4
Lim, J.5
Melski, D.6
Gruian, R.7
Yong, S.8
Chen, C.-H.9
Teitelbaum, T.10
-
5
-
-
34247166239
-
Static detection of malicious code in executable programs
-
Bergeron, J., Debbabi, M., Desharnais, J., Erhioui,M., Lavoie, Y., Tawbi, N.: Static detection of malicious code in executable programs. In: SREIS (2001)
-
(2001)
SREIS
-
-
Bergeron, J.1
Debbabi, M.2
Desharnais, J.3
Erhioui, M.4
Lavoie, Y.5
Tawbi, N.6
-
6
-
-
70349990723
-
Architecture of a Morphological Malware Detector
-
Bonfante, G., Kaczmarek, M., Marion, J.-Y.: Architecture of a Morphological Malware Detector. Journal in Computer Virology 5, 263-270 (2009)
-
(2009)
Journal in Computer Virology
, vol.5
, pp. 263-270
-
-
Bonfante, G.1
Kaczmarek, M.2
Marion, J.-Y.3
-
7
-
-
84924223669
-
Static analysis of executables to detect malicious patterns
-
Christodorescu, M., Jha, S.: Static analysis of executables to detect malicious patterns. In: 12th USENIX Security Symposium, pp. 169-186 (2003)
-
(2003)
12th USENIX Security Symposium
, pp. 169-186
-
-
Christodorescu, M.1
Jha, S.2
-
8
-
-
27544433210
-
Semantics-aware malware detection
-
Christodorescu, M., Jha, S., Seshia, S.A., Song, D.X., Bryant, R.E.: Semantics-aware malware detection. In: IEEE Symposium on Security and Privacy, pp. 32-46 (2005)
-
(2005)
IEEE Symposium on Security and Privacy
, pp. 32-46
-
-
Christodorescu, M.1
Jha, S.2
Seshia, S.A.3
Song, D.X.4
Bryant, R.E.5
-
10
-
-
84958757867
-
A BDD-Based Model Checker for Recursive Programs
-
Berry, G., Comon, H., Finkel, A. (eds.) CAV 2001. Springer, Heidelberg
-
Esparza, J., Schwoon, S.: A BDD-Based Model Checker for Recursive Programs. In: Berry, G., Comon, H., Finkel, A. (eds.) CAV 2001. LNCS, vol. 2102, pp. 324-336. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2102
, pp. 324-336
-
-
Esparza, J.1
Schwoon, S.2
-
14
-
-
38449121202
-
Using Verification Technology to Specify and Detect Malware
-
Moreno Díaz, R., Pichler, F., Quesada Arencibia, A. (eds.) EUROCAST 2007. Springer, Heidelberg
-
Holzer, A., Kinder, J., Veith, H.: Using Verification Technology to Specify and Detect Malware. In: Moreno Díaz, R., Pichler, F., Quesada Arencibia, A. (eds.) EUROCAST 2007. LNCS, vol. 4739, pp. 497-504. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4739
, pp. 497-504
-
-
Holzer, A.1
Kinder, J.2
Veith, H.3
-
15
-
-
84865980131
-
-
Version 12.0.0.374
-
Kaspersky, http://www.kaspersky.com, Version 12.0.0.374
-
Kaspersky
-
-
-
16
-
-
26444526878
-
Detecting Malicious Code by Model Checking
-
Julisch, K., Kruegel, C. (eds.) DIMVA 2005. Springer, Heidelberg
-
Kinder, J., Katzenbeisser, S., Schallhart, C., Veith, H.: Detecting Malicious Code by Model Checking. In: Julisch, K., Kruegel, C. (eds.) DIMVA 2005. LNCS, vol. 3548, pp. 174-187. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3548
, pp. 174-187
-
-
Kinder, J.1
Katzenbeisser, S.2
Schallhart, C.3
Veith, H.4
-
17
-
-
78149427452
-
Proactive detection of computer worms using model checking
-
Kinder, J., Katzenbeisser, S., Schallhart, C., Veith, H.: Proactive detection of computer worms using model checking. IEEE Trans. on Dependable and Secure Computing 7(4) (2010)
-
(2010)
IEEE Trans. on Dependable and Secure Computing
, vol.7
, Issue.4
-
-
Kinder, J.1
Katzenbeisser, S.2
Schallhart, C.3
Veith, H.4
-
18
-
-
48949099057
-
Jakstab: A Static Analysis Platform for Binaries
-
Gupta, A., Malik, S. (eds.) CAV 2008. Springer, Heidelberg
-
Kinder, J., Veith, H.: Jakstab: A Static Analysis Platform for Binaries. In: Gupta, A., Malik, S. (eds.) CAV 2008. LNCS, vol. 5123, pp. 423-427. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5123
, pp. 423-427
-
-
Kinder, J.1
Veith, H.2
-
19
-
-
84859363174
-
Context-sensitive analysis of obfuscated x86 executables
-
Lakhotia, A., Boccardo, D.R., Singh, A., Manacero, A.: Context-sensitive analysis of obfuscated x86 executables. In: PEPM (2010)
-
(2010)
PEPM
-
-
Lakhotia, A.1
Boccardo, D.R.2
Singh, A.3
Manacero, A.4
-
20
-
-
33751120104
-
A method for detecting obfuscated calls in malicious binaries
-
Lakhotia, A., Kumar, E.U., Venable, M.: A method for detecting obfuscated calls in malicious binaries. IEEE Trans. Software Eng. 31(11) (2005)
-
(2005)
IEEE Trans. Software Eng.
, vol.31
, Issue.11
-
-
Lakhotia, A.1
Kumar, E.U.2
Venable, M.3
-
21
-
-
84865973989
-
-
Qihoo 360, http://www.360.cn
-
Qihoo 360
-
-
-
22
-
-
84946414079
-
Static verification of worm and virus behavior in binary executables using model checking
-
Singh, P.K., Lakhotia, A.: Static verification of worm and virus behavior in binary executables using model checking. In: IAW, pp. 298-300 (2003)
-
(2003)
IAW
, pp. 298-300
-
-
Singh, P.K.1
Lakhotia, A.2
-
24
-
-
84859310292
-
Pushdown Model Checking for Malware Detection
-
Flanagan, C., König, B. (eds.) TACAS 2012. Springer, Heidelberg
-
Song, F., Touili, T.: Pushdown Model Checking for Malware Detection. In: Flanagan, C., König, B. (eds.) TACAS 2012. LNCS, vol. 7214, pp. 110-125. Springer, Heidelberg (2012)
-
(2012)
LNCS
, vol.7214
, pp. 110-125
-
-
Song, F.1
Touili, T.2
|