-
1
-
-
84870683360
-
-
Accessed June
-
Offensive Computing. http://www.offensivecomputing.net/, Accessed June 2011.
-
(2011)
-
-
-
2
-
-
84870699187
-
-
Accessed October
-
Virus Total. http://www.virustotal.com/, Accessed October 2011.
-
(2011)
-
-
-
3
-
-
84870717820
-
-
Accessed 6 October
-
Portable Executable iDentifier. http://peid.info/, Accessed 6 October 2011.
-
(2011)
-
-
-
4
-
-
80255137449
-
Graph-based malware detection using dynamic analysis
-
Blake Anderson, Daniel Quist, Joshua Neil, Curtis Storlie, and Terran Lane. Graph-Based Malware Detection using Dynamic Analysis. Journal in Computer Virology, 7:247-258, 2011.
-
(2011)
Journal in Computer Virology
, vol.7
, pp. 247-258
-
-
Anderson, B.1
Quist, D.2
Neil, J.3
Storlie, C.4
Lane, T.5
-
5
-
-
84870702147
-
-
Anubis. http://anubis.iseclab.org/, 2009.
-
(2009)
-
-
-
6
-
-
14344252374
-
Multiple kernel learning, conic duality, and the SMO algorithm
-
ACM
-
Francis R. Bach, Gert R. G. Lanckriet, and Michael I. Jordan. Multiple Kernel Learning, Conic Duality, and the SMO Algorithm. In Proceedings of the Twenty-First International Conference on Machine Learning. ACM, 2004.
-
(2004)
Proceedings of the Twenty-First International Conference on Machine Learning
-
-
Bach, F.R.1
Lanckriet, G.R.G.2
Jordan, M.I.3
-
7
-
-
21644433634
-
Xen and the art of virtualization
-
ACM
-
Paul Barham, Boris Dragovic, Keir Fraser, Steven Hand, Tim Harris, Alex Ho, Rolf Neugebauer, Ian Pratt, and Andrew Warfield. Xen and the Art of Virtualization. In Proceedings of the Nineteenth ACM Symposium on Operating Systems Principles, pages 164-177. ACM, 2003.
-
(2003)
Proceedings of the Nineteenth ACM Symposium on Operating Systems Principles
, pp. 164-177
-
-
Barham, P.1
Dragovic, B.2
Fraser, K.3
Hand, S.4
Harris, T.5
Ho, A.6
Neugebauer, R.7
Pratt, I.8
Warfield, A.9
-
8
-
-
84869841381
-
-
ISOC Network and Distributed System Security Symposium
-
Ulrich Bayer, Paolo Milani Comparetti, Clemens Hlauschek, Christopher Kruegel, and Engin Kirda. Scalable, Behavior-Based Malware Clustering. In ISOC Network and Distributed System Security Symposium. 2009.
-
(2009)
Scalable, Behavior-Based Malware Clustering
-
-
Bayer, U.1
Comparetti, P.M.2
Hlauschek, C.3
Kruegel, C.4
Kirda, E.5
-
9
-
-
33748932391
-
Dynamic analysis of malicious code
-
Ulrich Bayer, Andreas Moser, Christopher Kruegel, and Engin Kirda. Dynamic Analysis of Malicious Code. Journal in Computer Virology, 2:67-77, 2006.
-
(2006)
Journal in Computer Virology
, vol.2
, pp. 67-77
-
-
Bayer, U.1
Moser, A.2
Kruegel, C.3
Kirda, E.4
-
11
-
-
33846516584
-
-
Springer-Verlag New York, Inc., Secaucus, NJ, USA
-
Christopher M. Bishop. Pattern Recognition and Machine Learning (Information Science and Statistics). Springer-Verlag New York, Inc., Secaucus, NJ, USA, 2006.
-
(2006)
Pattern Recognition and Machine Learning (Information Science and Statistics)
-
-
Bishop, C.M.1
-
12
-
-
27144489164
-
A tutorial on support vector machines for pattern recognition
-
Christopher J. C. Burges. A Tutorial on Support Vector Machines for Pattern Recognition. Data Mining and Knowledge Discovery, 2:121-167, 1998.
-
(1998)
Data Mining and Knowledge Discovery
, vol.2
, pp. 121-167
-
-
Burges, C.J.C.1
-
14
-
-
77952602657
-
Efficient virus detection using dynamic instruction sequences
-
Jianyong Dai, Ratan Guha, and Joohan Lee. Efficient Virus Detection Using Dynamic Instruction Sequences. Journal of Computers, 4(5), 2009.
-
(2009)
Journal of Computers
, vol.4
, Issue.5
-
-
Dai, J.1
Guha, R.2
Lee, J.3
-
15
-
-
70349240080
-
Ether: Malware analysis via hardware virtualization extensions
-
Artem Dinaburg, Paul Royal, Monirul Sharif, and Wenke Lee. Ether: Malware Analysis Via Hardware Virtualization Extensions. In Proceedings of the 15th ACM Conference on Computer and Communications Security, pages 51-62, 2008.
-
(2008)
Proceedings of the 15th ACM Conference on Computer and Communications Security
, pp. 51-62
-
-
Dinaburg, A.1
Royal, P.2
Sharif, M.3
Lee, W.4
-
17
-
-
0027657329
-
Semi-infinite programming: Theory, methods, and applications
-
September
-
R. Hettich and K. O. Kortanek. Semi-Infinite Programming: Theory, Methods, and Applications. SIAM Review, 35:380-429, September 1993.
-
(1993)
SIAM Review
, vol.35
, pp. 380-429
-
-
Hettich, R.1
Kortanek, K.O.2
-
18
-
-
0032313923
-
Intrusion detection using sequences of system calls
-
January
-
Steven A. Hofmeyr, Stephanie Forrest, and Anil Somayaji. Intrusion Detection Using Sequences of System Calls. Journal of Computer Security, 6(3):151-180, January 1998.
-
(1998)
Journal of Computer Security
, vol.6
, Issue.3
, pp. 151-180
-
-
Hofmeyr, S.A.1
Forrest, S.2
Somayaji, A.3
-
19
-
-
33746882464
-
Malware phylogeny generation using permutations of code
-
Md. Karim, Andrew Walenstein, Arun Lakhotia, and Laxmi Parida. Malware Phylogeny Generation Using Permutations of Code. Journal in Computer Virology, 1:13-23, 2005.
-
(2005)
Journal in Computer Virology
, vol.1
, pp. 13-23
-
-
Karim, Md.1
Walenstein, A.2
Lakhotia, A.3
Parida, L.4
-
21
-
-
33845768389
-
Learning to detect and classify malicious executables in the wild
-
December
-
J. Zico Kolter and Marcus A. Maloof. Learning to Detect and Classify Malicious Executables in the Wild. The Journal of Machine Learning Research, 7:2721-2744, December 2006.
-
(2006)
The Journal of Machine Learning Research
, vol.7
, pp. 2721-2744
-
-
Zico Kolter, J.1
Maloof, M.A.2
-
22
-
-
33745670395
-
Polymorphic worm detection using structural information of executables
-
Springer Berlin / Heidelberg
-
Christopher Kruegel, Engin Kirda, Darren Mutz, William Robertson, and Giovanni Vigna. Polymorphic Worm Detection Using Structural Information of Executables. In Recent Advances in Intrusion Detection, pages 207-226. Springer Berlin / Heidelberg, 2006.
-
(2006)
Recent Advances in Intrusion Detection
, pp. 207-226
-
-
Kruegel, C.1
Kirda, E.2
Mutz, D.3
Robertson, W.4
Vigna, G.5
-
25
-
-
33745304805
-
Pin: Building customized program analysis tools with dynamic instrumentation
-
June
-
Chi-Keung Luk, Robert Cohn, Robert Muth, Harish Patil, Artur Klauser, Geoff Lowney, Steven Wallace, Vijay Janapa Reddi, and Kim Hazelwood. Pin: Building Customized Program Analysis Tools with Dynamic Instrumentation. ACM SIGPLAN Conference on Programming Language Design and Implementation, pages 190-200, June 2005.
-
(2005)
ACM SIGPLAN Conference on Programming Language Design and Implementation
, pp. 190-200
-
-
Luk, C.-K.1
Cohn, R.2
Muth, R.3
Patil, H.4
Klauser, A.5
Lowney, G.6
Wallace, S.7
Reddi, V.J.8
Hazelwood, K.9
-
26
-
-
34548583274
-
A tutorial on spectral clustering
-
Ulrike Luxburg. A Tutorial on Spectral Clustering. Statistics and Computing, 17(4):395-416, 2007.
-
(2007)
Statistics and Computing
, vol.17
, Issue.4
, pp. 395-416
-
-
Luxburg, U.1
-
27
-
-
34047129159
-
Using entropy analysis to find encrypted and packed malware
-
Robert Lyda and James Hamrock. Using Entropy Analysis to Find Encrypted and Packed Malware. IEEE Security & Privacy, 5(2):40-45, 2007.
-
(2007)
IEEE Security & Privacy
, vol.5
, Issue.2
, pp. 40-45
-
-
Lyda, R.1
Hamrock, J.2
-
28
-
-
58549090885
-
Improving malware detection by applying multi-inducer ensemble
-
Eitan Menahem, Asaf Shabtai, Lior Rokach, and Yuval Elovici. Improving Malware Detection by Applying Multi-Inducer Ensemble. Computational Statistics and Data Analysis, 53(4):1483-1494, 2009.
-
(2009)
Computational Statistics and Data Analysis
, vol.53
, Issue.4
, pp. 1483-1494
-
-
Menahem, E.1
Shabtai, A.2
Rokach, L.3
Elovici, Y.4
-
29
-
-
48649087530
-
Limits of static analysis for malware detection
-
Andreas Moser, Christopher Kruegel, and Engin Kirda. Limits of Static Analysis for Malware Detection. Computer Security Applications Conference, Annual, 0:421-430, 2007.
-
(2007)
Computer Security Applications Conference, Annual
, vol.0
, pp. 421-430
-
-
Moser, A.1
Kruegel, C.2
Kirda, E.3
-
31
-
-
77956609298
-
Virtualized in-cloud security services for mobile devices
-
ACM
-
Jon Oberheide, Kaushik Veeraraghavan, Evan Cooke, Jason Flinn, and Farnam Jahanian. Virtualized In-Cloud Security Services for Mobile Devices. In Proceedings of the First Workshop on Virtualization in Mobile Computing, MobiVirt, pages 31-35. ACM, 2008.
-
(2008)
Proceedings of the First Workshop on Virtualization in Mobile Computing, MobiVirt
, pp. 31-35
-
-
Oberheide, J.1
Veeraraghavan, K.2
Cooke, E.3
Flinn, J.4
Jahanian, F.5
-
32
-
-
33751051489
-
Misleading worm signature generators using deliberate noise injection
-
Roberto Perdisci, David Dagon, Prahlad Fogla, and Monirul Sharif. Misleading Worm Signature Generators Using Deliberate Noise Injection. In In Proceedings of the 2006 IEEE Symposium on Security and Privacy, pages 17-31, 2006.
-
(2006)
Proceedings of the 2006 IEEE Symposium on Security and Privacy
, pp. 17-31
-
-
Perdisci, R.1
Dagon, D.2
Fogla, P.3
Sharif, M.4
-
33
-
-
84870724468
-
-
IDA Pro. http://www.hex-rays.com/products/ida/index.shtml, 2012.
-
(2012)
-
-
-
34
-
-
84869832423
-
Improving antivirus accuracy with hypervisor assisted analysis
-
Daniel Quist, Lorie Liebrock, and Joshua Neil. Improving Antivirus Accuracy with Hypervisor Assisted Analysis. Journal in Computer Virology, pages 1-11, 2010.
-
(2010)
Journal in Computer Virology
, pp. 1-11
-
-
Quist, D.1
Liebrock, L.2
Neil, J.3
-
35
-
-
49949090311
-
Learning and classification of malware behavior
-
Springer Berlin / Heidelberg
-
Konrad Rieck, Thorsten Holz, Carsten Willems, Patrick D'Aijssel, and Pavel Laskov. Learning and Classification of Malware Behavior. In Detection of Intrusions and Malware, and Vulnerability Assessment, volume 5137 of Lecture Notes in Computer Science, pages 108-125. Springer Berlin / Heidelberg, 2008.
-
(2008)
Detection of Intrusions and Malware, and Vulnerability Assessment, Volume 5137 of Lecture Notes in Computer Science
, pp. 108-125
-
-
Rieck, K.1
Holz, T.2
Willems, C.3
D'Aijssel, P.4
Laskov, P.5
-
36
-
-
34748820878
-
Poly unpack: Automating the hidden-code extraction of unpack-executing malware
-
Paul Royal, Mitch Halpin, David Dagon, Robert Edmonds, and Wenke Lee. PolyUnpack: Automating the Hidden-Code Extraction of Unpack-Executing Malware. In 22nd Annual Computer Security Applications Conference (ACSAC), pages 289-300, 2006.
-
(2006)
22nd Annual Computer Security Applications Conference (ACSAC)
, pp. 289-300
-
-
Royal, P.1
Halpin, M.2
Dagon, D.3
Edmonds, R.4
Lee, W.5
-
38
-
-
0034829697
-
A fast automaton-based method for detecting anomalous program behaviors
-
R. Sekar, M. Bendre, D. Dhurjati, and P. Bollineni. A Fast Automaton-Based Method for Detecting Anomalous Program Behaviors. In IEEE Symposium on Security and Privacy, pages 144-155, 2001.
-
(2001)
IEEE Symposium on Security and Privacy
, pp. 144-155
-
-
Sekar, R.1
Bendre, M.2
Dhurjati, D.3
Bollineni, P.4
-
39
-
-
49949094798
-
Embedded malware detection using Markov n-grams
-
Springer Berlin / Heidelberg
-
M. Shafiq, Syed Khayam, and Muddassar Farooq. Embedded Malware Detection Using Markov n-Grams. In Detection of Intrusions and Malware, and Vulnerability Assessment, volume 5137 of Lecture Notes in Computer Science, pages 88-107. Springer Berlin / Heidelberg, 2008.
-
(2008)
Detection of Intrusions and Malware, and Vulnerability Assessment, Volume 5137 of Lecture Notes in Computer Science
, pp. 88-107
-
-
Shafiq, M.1
Khayam, S.2
Farooq, M.3
-
40
-
-
79955114244
-
Malware detection using assembly and API call sequences
-
Madhu Shankarapani, Subbu Ramamoorthy, Ram Movva, and Srinivas Mukkamala. Malware Detection Using Assembly and API Call Sequences. Journal in Computer Virology, 7(2):1-13, 2010.
-
(2010)
Journal in Computer Virology
, vol.7
, Issue.2
, pp. 1-13
-
-
Shankarapani, M.1
Ramamoorthy, S.2
Movva, R.3
Mukkamala, S.4
-
41
-
-
84862273366
-
Efficient graphlet kernels for large graph comparison
-
CSAIL
-
Nino Shervashidze, S. V. N. Vishwanathan, Tobias H. Petri, Kurt Mehlhorn, and Karsten M. Borgwardt. Efficient Graphlet Kernels for Large Graph Comparison. In Proceedings of the Twelfth International Conference on Artificial Intelligence and Statistics (AISTATS), volume 5, pages 488-495. CSAIL, 2009.
-
(2009)
Proceedings of the Twelfth International Conference on Artificial Intelligence and Statistics (AISTATS)
, vol.5
, pp. 488-495
-
-
Shervashidze, N.1
Vishwanathan, S.V.N.2
Petri, T.H.3
Mehlhorn, K.4
Borgwardt, K.M.5
-
42
-
-
58449129985
-
BitBlaze: A new approach to computer security via binary analysis
-
Springer Berlin / Heidelberg
-
Dawn Song, David Brumley, Heng Yin, Juan Caballero, Ivan Jager, Min Kang, Zhenkai Liang, James Newsome, Pongsin Poosankam, and Prateek Saxena. BitBlaze: A New Approach to Computer Security via Binary Analysis. In Information Systems Security, volume 5352 of Lecture Notes in Computer Science, pages 1-25. Springer Berlin / Heidelberg, 2008.
-
(2008)
Information Systems Security, Volume 5352 of Lecture Notes in Computer Science
, pp. 1-25
-
-
Song, D.1
Brumley, D.2
Yin, H.3
Caballero, J.4
Jager, I.5
Kang, M.6
Liang, Z.7
Newsome, J.8
Poosankam, P.9
Saxena, P.10
-
44
-
-
77954666305
-
The SHOGUN machine learning toolbox
-
August
-
Sören Sonnenburg, Gunnar Rätsch, Sebastian Henschel, Christian Widmer, Jonas Behr, Alexander Zien, Fabio de Bona, Alexander Binder, Christian Gehl, and Vojtěch Franc. The SHOGUN Machine Learning Toolbox. The Journal of Machine Learning Research, 99:1799-1802, August 2010.
-
(2010)
The Journal of Machine Learning Research
, vol.99
, pp. 1799-1802
-
-
Sonnenburg, S.1
Rätsch, G.2
Henschel, S.3
Widmer, C.4
Behr, J.5
Zien, A.6
De Bona, F.7
Binder, A.8
Gehl, C.9
Franc, V.10
-
45
-
-
84882697421
-
Towards stealthy malware detection
-
Springer US
-
Salvatore Stolfo, Ke Wang, and Wei-Jen Li. Towards Stealthy Malware Detection. In Malware Detection, volume 27 of Advances in Information Security, pages 231-249. Springer US, 2007.
-
(2007)
Malware Detection, Volume 27 of Advances in Information Security
, pp. 231-249
-
-
Stolfo, S.1
Wang, K.2
Li, W.-J.3
-
47
-
-
84869815087
-
-
Symantec. White Paper, April
-
Symantec. Internet Security Threat Report, Volume 16. White Paper, April 2011.
-
(2011)
Internet Security Threat Report
, vol.16
-
-
-
48
-
-
84870677902
-
-
Accessed 6 October
-
The Silicon Realms Toolworks. Armadillo Software Protection System. http://www.siliconrealms.com/, Accessed 6 October 2011.
-
(2011)
Armadillo Software Protection System
-
-
-
49
-
-
84870703237
-
-
Accessed 6 October
-
UPX: The Ultimate Packer for eXecutables. http://upx.sourceforge.net/, Accessed 6 October 2011.
-
(2011)
-
-
-
50
-
-
80052681285
-
Combining file content and file relations for cloud based malware detection
-
Yanfang Ye, Tao Li, Shenghuo Zhu, Weiwei Zhuang, Egmen Tas, Umesh Gupta, and Melih Abdulhayoglu. Combining File Content and File Relations for Cloud Based Malware Detection. In Proceedings of the 17th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2011.
-
(2011)
Proceedings of the 17th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining
-
-
Ye, Y.1
Li, T.2
Zhu, S.3
Zhuang, W.4
Tas, E.5
Gupta, U.6
Abdulhayoglu, M.7
-
51
-
-
77950788046
-
Panorama: Capturing system-wide information flow for malware detection and analysis
-
ACM
-
Heng Yin, Dawn Song, Manuel Egele, Christopher Kruegel, and Engin Kirda. Panorama: Capturing System-Wide Information Flow for Malware Detection and Analysis. In Proceedings of the 14th ACM Conference on Computer and Communications Security, CCS '07, pages 116-127. ACM, 2007.
-
(2007)
Proceedings of the 14th ACM Conference on Computer and Communications Security, CCS '07
, pp. 116-127
-
-
Yin, H.1
Song, D.2
Egele, M.3
Kruegel, C.4
Kirda, E.5
|