-
2
-
-
52149092178
-
The evolution of commercial malware development kits and colour-by-numbers custom malware
-
[Online]. Available
-
Gunter and Ollmann, "The evolution of commercial malware development kits and colour-by-numbers custom malware," Computer Fraud and Security, vol. 2008, no. 9, pp. 4-7, 2008. [Online]. Available: http://www.sciencedirect. com/science/article/pii/S1361372308701350
-
(2008)
Computer Fraud and Security
, vol.2008
, Issue.9
, pp. 4-7
-
-
Gunter1
Ollmann2
-
4
-
-
33751032041
-
SubVirt: Implementing malware with virtual machines
-
S. King, P. Chen, C. Verbowski, H. Wang, and J. Lorch, "SubVirt: Implementing malware with virtual machines," 2006 IEEE Symposium on Security and Privacy (S&P'06), pp. 314-327, 2006.
-
(2006)
2006 IEEE Symposium on Security and Privacy (S&P'06)
, pp. 314-327
-
-
King, S.1
Chen, P.2
Verbowski, C.3
Wang, H.4
Lorch, J.5
-
5
-
-
74049152260
-
Hey, you, get off of my cloud: Exploring information leakage in third-party compute clouds
-
ser. CCS '09. New York, NY, USA: ACM, [Online]. Available
-
T. Ristenpart, E. Tromer, H. Shacham, and S. Savage, "Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds," in Proceedings of the 16th ACM conference on Computer and communications security, ser. CCS '09. New York, NY, USA: ACM, 2009, pp. 199-212. [Online]. Available: http://doi.acm.org/10.1145/1653662.1653687
-
(2009)
Proceedings of the 16th ACM Conference on Computer and Communications Security
, pp. 199-212
-
-
Ristenpart, T.1
Tromer, E.2
Shacham, H.3
Savage, S.4
-
6
-
-
34047110218
-
Toward Automated Dynamic Malware Analysis Using CWSandbox
-
Mar.
-
C. Willems, T. Holz, and F. Freiling, "Toward Automated Dynamic Malware Analysis Using CWSandbox," IEEE Security and Privacy Magazine, vol. 5, no. 2, pp. 32-39, Mar. 2007.
-
(2007)
IEEE Security and Privacy Magazine
, vol.5
, Issue.2
, pp. 32-39
-
-
Willems, C.1
Holz, T.2
Freiling, F.3
-
8
-
-
77950853188
-
Stealthy malware detection through vmm-based out-of-the-box" semantic view reconstruction
-
ser. CCS '07. New York, NY, USA: ACM, [Online]. Available
-
X. Jiang, X. Wang, and D. Xu, "Stealthy malware detection through vmm-based "out-of-the-box" semantic view reconstruction," in Proceedings of the 14th ACM conference on Computer and communications security, ser. CCS '07. New York, NY, USA: ACM, 2007, pp. 128-138. [Online]. Available: http://doi.acm.org/10.1145/1315245.1315262
-
(2007)
Proceedings of the 14th ACM Conference on Computer and Communications Security
, pp. 128-138
-
-
Jiang, X.1
Wang, X.2
Xu, D.3
-
9
-
-
70349240080
-
Ether: Malware Analysis via Hardware Virtualization Extensions
-
A. Dinaburg, P. Royal, M. Sharif, and W. Lee, "Ether : Malware Analysis via Hardware Virtualization Extensions," Analysis, pp. 51-62, 2008.
-
(2008)
Analysis
, pp. 51-62
-
-
Dinaburg, A.1
Royal, P.2
Sharif, M.3
Lee, W.4
-
10
-
-
34548737161
-
Exploring Multiple Execution Paths for Malware Analysis
-
vol. 0
-
A. Moser, C. Kruegel, and E. Kirda, "Exploring Multiple Execution Paths for Malware Analysis," 2007 IEEE Symposium on Security and Privacy SP 07, vol. 0, pp. 231-245, 2007.
-
2007 IEEE Symposium on Security and Privacy SP 07
, Issue.2007
, pp. 231-245
-
-
Moser, A.1
Kruegel, C.2
Kirda, E.3
-
11
-
-
48649089436
-
Improving proactive detection of packed malware
-
no. March
-
A. Stepan, "Improving proactive detection of packed malware." Virus Bulletin, vol. 1, no. March, 2006.
-
(2006)
Virus Bulletin
, vol.1
-
-
Stepan, A.1
-
12
-
-
56549090955
-
A study of the packer problem and its solutions
-
Springer
-
F. Guo, P. Ferrie, and T. Chiueh, "A study of the packer problem and its solutions," in Recent Advances in Intrusion Detection. Springer, 2008, pp. 98-115.
-
(2008)
Recent Advances in Intrusion Detection
, pp. 98-115
-
-
Guo, F.1
Ferrie, P.2
Chiueh, T.3
-
14
-
-
57049186367
-
Eureka: A framework for enabling static malware analysis
-
M. Sharif, V. Yegneswaran, H. Saidi, P. Porras, and W. Lee, "Eureka: A framework for enabling static malware analysis," Computer Security-ESORICS 2008, pp. 481-500, 2008.
-
(2008)
Computer Security-ESORICS
, vol.2008
, pp. 481-500
-
-
Sharif, M.1
Yegneswaran, V.2
Saidi, H.3
Porras, P.4
Lee, W.5
-
17
-
-
84866766475
-
-
Kaspersky, "Virus.Win32.Sality.bh," 2011, http://www. securelist.com/en/descriptions/15312802/Virus.Win32.Sality.bh\#doc1.
-
(2011)
Virus.Win32.Sality.bh
-
-
Kaspersky1
-
18
-
-
84866766472
-
-
S. Researcher, and I. B. M. X-force, Agenda
-
J. Larimer, S. Researcher, and I. B. M. X-force, "An inside look at Stuxnet," Agenda, 2009.
-
(2009)
An Inside Look at Stuxnet
-
-
Larimer, J.1
-
19
-
-
77954950954
-
Symantec Internet Security Threat Report: Trend for 2010
-
no. April
-
M. Fossi, G. Egan, K. Haley, E. Johnson, T. Mack, T. Adams, J. Blackbird, L. Mo King, D. Mazurek, D. McKinney, and P. Wood, "Symantec Internet Security Threat Report: Trend for 2010," internet security threat, vol. 16, no. April, 2011.
-
(2011)
Internet Security Threat
, vol.16
-
-
Fossi, M.1
Egan, G.2
Haley, K.3
Johnson, E.4
Mack, T.5
Adams, T.6
Blackbird, J.7
Mo King, L.8
Mazurek, D.9
McKinney, D.10
Wood, P.11
-
20
-
-
56549094407
-
-
M. Oberhumer, M.F. and J. ar, L., Reiser, "UPX: the Ultimate Packer for eXecutables (2007)," 2007, http://upx.sourceforge.net/.
-
(2007)
UPX: The Ultimate Packer for EXecutables (2007)
-
-
Oberhumer, M.1
F, M.2
Ar, J.3
Reiser, L.4
-
21
-
-
84866766228
-
-
Oreans Technologies, "Themida," http://www.oreans.com/.
-
Themida
-
-
-
22
-
-
84947615443
-
-
ASPack
-
ASPack Software, "ASPack," http://www.aspack.com/.
-
ASPack Software
-
-
-
25
-
-
34047180006
-
Code Normalization for Self-Mutating Malware
-
D. Bruschi, L. Martignoni, and M. Monga, "Code Normalization for Self-Mutating Malware," Ieee Security And Privacy, vol. 5, no. 2, pp. 46-54, 2007.
-
(2007)
Ieee Security and Privacy
, vol.5
, Issue.2
, pp. 46-54
-
-
Bruschi, D.1
Martignoni, L.2
Monga, M.3
-
26
-
-
0023294949
-
Computer viruses: Theory and experiments
-
[Online]. Available
-
Fred and Cohen, "Computer viruses: Theory and experiments," Computers and Security, vol. 6, no. 1, pp. 22-35, 1987. [Online]. Available: http://www.sciencedirect.com/science/article/pii/0167404887901222
-
(1987)
Computers and Security
, vol.6
, Issue.1
, pp. 22-35
-
-
Fred1
Cohen2
-
27
-
-
84855404052
-
Hypervisor support for identifying covertly executing binaries
-
Berkeley, CA, USA: USENIX Association
-
L. Litty, H. A. Lagar-Cavilla, and D. Lie, "Hypervisor support for identifying covertly executing binaries," in Proceedings of the 17th conference on Security symposium. Berkeley, CA, USA: USENIX Association, 2008, pp. 243-258.
-
(2008)
Proceedings of the 17th Conference on Security Symposium
, pp. 243-258
-
-
Litty, L.1
Lagar-Cavilla, H.A.2
Lie, D.3
-
28
-
-
80053166833
-
-
Amazon, "Amazon EC2 FAQs," 2011, http://aws.amazon.com/ec2/ faqs/.
-
(2011)
Amazon EC2 FAQs
-
-
-
31
-
-
84866765981
-
The definitive guide to the xen hypervisor
-
D. Chisnall, "The definitive guide to the xen hypervisor," Journal of the Electrochemical Society, vol. 129, p. 2865, 2007.
-
(2007)
Journal of the Electrochemical Society
, vol.129
, pp. 2865
-
-
Chisnall, D.1
-
32
-
-
74049126468
-
A formal model for virtual machine introspection
-
J. Pfoh, C. Schneider, and C. Eckert, "A formal model for virtual machine introspection," Conference on Computer and Communications Security, pp. 1-10, 2009.
-
(2009)
Conference on Computer and Communications Security
, pp. 1-10
-
-
Pfoh, J.1
Schneider, C.2
Eckert, C.3
-
33
-
-
48649084773
-
OmniUnpack: Fast, Generic, and Safe Unpacking of Malware
-
Dec.
-
L. Martignoni, M. Christodorescu, and S. Jha, "OmniUnpack: Fast, Generic, and Safe Unpacking of Malware," Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007), pp. 431-441, Dec. 2007.
-
(2007)
Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007)
, pp. 431-441
-
-
Martignoni, L.1
Christodorescu, M.2
Jha, S.3
-
34
-
-
70349448915
-
-
October
-
M. G. Kang, P. Poosankam, and H. Yin, "Renovo : A Hidden Code Extractor for Packed Executables," October, pp. 46-53, 2007.
-
(2007)
Renovo: A Hidden Code Extractor for Packed Executables
, pp. 46-53
-
-
Kang, M.G.1
Poosankam, P.2
Yin, H.3
-
37
-
-
84866753850
-
-
J. Rutkowska, "Redpill," 2004, http://www.invisiblethings.org/ papers/redpill.html.
-
(2004)
Redpill
-
-
Rutkowska, J.1
|