-
3
-
-
85063636742
-
QEMU, a fast and portable dynamic translator
-
Bellard, F. (2005): QEMU, a fast and portable dynamic translator. USENIX Annual Technical Conference, 41-46
-
(2005)
USENIX Annual Technical Conference
, pp. 41-46
-
-
Bellard, F.1
-
4
-
-
84869033248
-
Pandora's Bochs: Automatic Unpacking of Malware
-
Boehne, L. (2008): Pandora's Bochs: Automatic Unpacking of Malware. University of Mannheim.
-
(2008)
University of Mannheim.
-
-
Boehne, L.1
-
5
-
-
77954325210
-
Graphs, Entropy and Grid Computing: Automatic Comparison of Malware
-
Briones, I. & Gomez, A. (2008): Graphs, Entropy and Grid Computing: Automatic Comparison of Malware. Virus Bulletin Conference, 1-12.
-
(2008)
Virus Bulletin Conference
, pp. 1-12
-
-
Briones, I.1
Gomez, A.2
-
6
-
-
54849432819
-
Digital genome mapping-advanced binary malware analysis
-
Carrera, E. & Erdélyi, G. (2004): Digital genome mapping-advanced binary malware analysis. Virus Bulletin Conference, 187-197.
-
(2004)
Virus Bulletin Conference
, pp. 187-197
-
-
Carrera, E.1
Erdélyi, G.2
-
8
-
-
70349240080
-
Ether: Malware analysis via hardware virtualization extensions
-
ACM New York, NY, USA.
-
Dinaburg, A., Royal, P., Sharif, M. & Lee, W. (2008): Ether: Malware analysis via hardware virtualization extensions. Proceedings of the 15th ACM conference on Computer and communications security, 51-62, ACM New York, NY, USA.
-
(2008)
Proceedings of the 15th ACM conference on Computer and communications security
, pp. 51-62
-
-
Dinaburg, A.1
Royal, P.2
Sharif, M.3
Lee, W.4
-
9
-
-
77954316719
-
Graph-based comparison of Executable Objects (English Version)
-
Dullien, T. & Rolles, R. (2005): Graph-based comparison of Executable Objects (English Version). SSTIC.
-
(2005)
SSTIC.
-
-
Dullien, T.1
Rolles, R.2
-
10
-
-
57049171932
-
Binhunt: Automatically finding semantic differences in binary programs
-
Gao, D., Reiter, M. K. & Song, D. (2008): Binhunt: Automatically finding semantic differences in binary programs. Information and Communications Security, 5308:238-255, Springer.
-
(2008)
Information and Communications Security
, vol.5308
, Issue.SPRINGER
, pp. 238-255
-
-
Gao, D.1
Reiter, M.K.2
Song, D.3
-
11
-
-
54849414050
-
An automated virus classification system
-
Gheorghescu, M. (2005): An automated virus classification system. Virus Bulletin Conference, 294-300.
-
(2005)
Virus Bulletin Conference
, pp. 294-300
-
-
Gheorghescu, M.1
-
12
-
-
70349122266
-
Generic unpacking: How to handle modified or unknown PE compression engines
-
Graf, T. (2005): Generic unpacking: How to handle modified or unknown PE compression engines. Virus Bulletin Conference.
-
(2005)
Virus Bulletin Conference.
-
-
Graf, T.1
-
14
-
-
33746882464
-
Malware phylogeny generation using permutations of code
-
Karim, M. E., Walenstein, A., Lakhotia, A. & Parida, L. (2005) Malware phylogeny generation using permutations of code. Journal in Computer Virology, 1 (1):13-23.
-
(2005)
Journal in Computer Virology
, vol.1
, Issue.1
, pp. 13-23
-
-
Karim, M.E.1
Walenstein, A.2
Lakhotia, A.3
Parida, L.4
-
16
-
-
33745670395
-
Polymorphic worm detection using structural information of executables
-
Kruegel, C., Kirda, E., Mutz, D., Robertson, W. & Vigna, G. (2006) Polymorphic worm detection using structural information of executables. Lecture notes in computer science, 3858:207.
-
(2006)
Lecture notes in computer science
, vol.3858
, pp. 207
-
-
Kruegel, C.1
Kirda, E.2
Mutz, D.3
Robertson, W.4
Vigna, G.5
-
17
-
-
85084160818
-
Static disassembly of obfuscated binaries
-
Kruegel, C., Robertson, W., Valeur, F. & Vigna, G. (2004): Static disassembly of obfuscated binaries. USENIX Security Symposium, 13:18-18.
-
(2004)
USENIX Security Symposium
, vol.13
, pp. 18-18
-
-
Kruegel, C.1
Robertson, W.2
Valeur, F.3
Vigna, G.4
-
18
-
-
34047129159
-
Using entropy analysis to find encrypted and packed malware
-
Lyda, R. & Hamrock, J. (2007) Using entropy analysis to find encrypted and packed malware. IEEE Security and Privacy, 5 (2):40.
-
(2007)
IEEE Security and Privacy
, vol.5
, Issue.2
, pp. 40
-
-
Lyda, R.1
Hamrock, J.2
-
19
-
-
48649084773
-
Omniunpack: Fast, generic, and safe unpacking of malware
-
Martignoni, L., Christodorescu, M. & Jha, S. (2007): Omniunpack: Fast, generic, and safe unpacking of malware. Proceedings of the Annual Computer Security Applications Conference (ACSAC), 431-441.
-
(2007)
Proceedings of the Annual Computer Security Applications Conference (ACSAC)
, pp. 431-441
-
-
Martignoni, L.1
Christodorescu, M.2
Jha, S.3
-
20
-
-
85008257023
-
Testing CPU emulators
-
Chicago, IL, USA, ACM.
-
Martignoni, L., Paleari, R., Roglia, G. F. & Bruschi, D. (2009): Testing CPU emulators. Proceedings of the eighteenth international symposium on Software testing and analysis, Chicago, IL, USA, 261-272, ACM.
-
(2009)
Proceedings of the eighteenth international symposium on Software testing and analysis
, pp. 261-272
-
-
Martignoni, L.1
Paleari, R.2
Roglia, G.F.3
Bruschi, D.4
-
21
-
-
0035784361
-
New algorithms for control-flow graph structuring
-
Moretti, E., Chanteperdrix, G. & Osorio, A. (2001): New algorithms for control-flow graph structuring. Software Maintenance and Reengineering, 184. Mal(ware)formation statistics - Panda Research Blog: Panda Research, http://research.pandasecurity.com/archive/Mal_2800_ware_2900_formation-statistics.aspx. 19 August 2009.
-
(2001)
Software Maintenance and Reengineering
, pp. 184
-
-
Moretti, E.1
Chanteperdrix, G.2
Osorio, A.3
-
22
-
-
84869003041
-
-
Mal(ware)formation statistics - Panda Research Blog: Panda Research, 19 August
-
Mal(ware)formation statistics - Panda Research Blog: Panda Research, http://research.pandasecurity.com/archive/Mal_2800_ware_2900_formation-statistics.aspx. 19 August 2009.
-
(2009)
-
-
-
23
-
-
60649088451
-
McBoost: Boosting Scalability in Malware Collection and Analysis Using Statistical Classification of Executables
-
IEEE Computer Society Washington, DC, USA.
-
Perdisci, R., Lanzi, A. & Lee, W. (2008): McBoost: Boosting Scalability in Malware Collection and Analysis Using Statistical Classification of Executables. Proceedings of the 2008 Annual Computer Security Applications Conference, 301-310, IEEE Computer Society Washington, DC, USA.
-
(2008)
Proceedings of the 2008 Annual Computer Security Applications Conference
, pp. 301-310
-
-
Perdisci, R.1
Lanzi, A.2
Lee, W.3
-
24
-
-
77955171595
-
Covert Debugging Circumventing Software Armoring Techniques
-
Black Hat Briefings USA.
-
Quist, D. & Valsmith (2007): Covert Debugging Circumventing Software Armoring Techniques. Black Hat Briefings USA.
-
(2007)
-
-
Quist1
Valsmith, D.2
-
25
-
-
34748820878
-
Polyunpack: Automating the hiddencode extraction of unpack-executing malware
-
Royal, P., Halpin, M., Dagon, D., Edmonds, R. & Lee, W. (2006): Polyunpack: Automating the hiddencode extraction of unpack-executing malware. Computer Security Applications Conference, 289-300.
-
(2006)
Computer Security Applications Conference
, pp. 289-300
-
-
Royal, P.1
Halpin, M.2
Dagon, D.3
Edmonds, R.4
Lee, W.5
-
26
-
-
70449649114
-
Rotalume: A Tool for Automatic Reverse Engineering of Malware Emulators
-
INC., I. G.
-
Sharif, M., Lanzi, A., Giffin, J. & Lee, W. Rotalume: A Tool for Automatic Reverse Engineering of Malware Emulators. INC., I. G.
-
-
-
Sharif, M.1
Lanzi, A.2
Giffin, J.3
Lee, W.4
-
27
-
-
48649089436
-
Improving proactive detection of packed malware
-
Stepan, A. (2006): Improving proactive detection of packed malware. Virus Bulletin Conference, 1.
-
(2006)
Virus Bulletin Conference, 1.
-
-
Stepan, A.1
-
29
-
-
37349047729
-
Structuring 2-way branches in binary executables
-
Wei, T., Mao, J., Zou, W. & Chen, Y. (2007): Structuring 2-way branches in binary executables. International Computer Software and Applications Conference, 01: 115-118.
-
(2007)
International Computer Software and Applications Conference
, vol.1
, pp. 115-118
-
-
Wei, T.1
Mao, J.2
Zou, W.3
Chen, Y.4
-
30
-
-
70350650685
-
Efficient and Automatic Instrumentation for Packed Binaries
-
VxClass: Zynamics
-
Wu, Y., Chiueh, T. & Zhao, C. (2009): Efficient and Automatic Instrumentation for Packed Binaries. International Conference and Workshops on Advances in Information Security and Assurance, 307-316. VxClass: Zynamics, http://www.zynamics.com/vxclass.html.
-
(2009)
International Conference and Workshops on Advances in Information Security and Assurance
, pp. 307-316
-
-
Wu, Y.1
Chiueh, T.2
Zhao, C.3
|