-
3
-
-
80255137449
-
Graph-Based malware detection using dynamic analysis
-
ANDERSON, B., QUIST, D., NEIL, J., STORLIE, C., AND LANE, T. 2011. Graph-Based malware detection using dynamic analysis. J. Comput. Virol. 7, 247-258.
-
(2011)
J. Comput. Virol.
, vol.7
, pp. 247-258
-
-
Anderson, B.1
Quist, D.2
Neil, J.3
Storlie, C.4
Lane, T.5
-
5
-
-
16644362894
-
Randomized instruction set emulation
-
BARRANTES, E. G., ACKLEY, D., FORREST, S., AND STEFANOVI, D. 2005. Randomized instruction set emulation. ACM Trans. Info. Syst. Secu. 8, 1, 3-40.
-
(2005)
ACM Trans. Info. Syst. Secu.
, vol.8
, Issue.1
, pp. 3-40
-
-
Barrantes, E.G.1
Ackley, D.2
Forrest, S.3
Stefanovi, D.4
-
6
-
-
84872961892
-
-
arXiv:1109.0507v1
-
BARTH, A., LI, S., RUBINSTEIN, B., AND SONG, D. 2011. How open should open source be? arXiv:1109.0507v1.
-
How Open Should Open Source Be?
, pp. 2011
-
-
Barth, A.1
I, S.L.2
Rubinstein, B.3
Song, D.4
-
7
-
-
84872954196
-
-
BARTHEN. [WoW] [3.0.9] Symbolic info
-
BARTHEN. 2009. [WoW] [3.0.9] Symbolic info. http://www.mmowned.com/ forums/world-of-warcraft/botsprograms/memory-editing/219320-wow-3-0-9-symbolic- info.html.
-
(2009)
-
-
-
8
-
-
77954701461
-
Improving the efficiency of dynamic malware analysis
-
ACM, New York
-
BAYER, U., KIRDA, E., AND KRUEGEL, C. 2010. Improving the efficiency of dynamic malware analysis. In Proceedings of the 2010 ACM Symposium on Applied Computing (SAC'10). ACM, New York, 1871-1878.
-
(2010)
Proceedings of the 2010 ACM Symposium on Applied Computing (SAC'10)
, pp. 1871-1878
-
-
Bayer, U.1
Kirda, E.2
Kruegel, C.3
-
10
-
-
0032162672
-
Collusion-Secure fingerprinting for digital data
-
BONEH, D. AND SHAW, J. 1998. Collusion-Secure fingerprinting for digital data. IEEE Trans. Info. Theory 44, 5, 1897-1905.
-
(1998)
IEEE Trans. Info. Theory
, vol.44
, Issue.5
, pp. 1897-1905
-
-
Boneh, D.1
Shaw, J.2
-
11
-
-
50249085491
-
Automatic patch-based exploit generation is possible: Techniques and implications
-
BRUMLEY, D., POOSANKAM, P., SONG, D., AND ZHENG, J. 2008. Automatic patch-based exploit generation is possible: Techniques and implications. In Proceedings of the IEEE Symposium on Security and Privacy.
-
(2008)
Proceedings of the IEEE Symposium on Security and Privacy
-
-
Brumley, D.1
Poosankam, P.2
Song, D.3
Zheng, J.4
-
12
-
-
0027684663
-
Operating system evolution through program evolution
-
COHEN, F. 1993. Operating system evolution through program evolution. Comput. Secur. 12, 6, 565-584.
-
(1993)
Comput. Secur.
, vol.12
, Issue.6
, pp. 565-584
-
-
Cohen, F.1
-
13
-
-
0031649930
-
Manufacturing cheap, resilient, and stealthy opaque constructs
-
ACM Press
-
COLLBERG, C., THOMBORSON, C., AND LOW, D. 1998. Manufacturing cheap, resilient, and stealthy opaque constructs. In Proceedings of the 25th Conference on Principles of Programming Languages. ACM Press, 184-196.
-
(1998)
Proceedings of the 25th Conference on Principles of Programming Languages
, pp. 184-196
-
-
Collberg, C.1
Thomborson, C.2
Low, D.3
-
16
-
-
84886393009
-
N-Variant systems: A secretless framework for security through diversity
-
COX, B., EVANS, D., FILIPI, A., ROWANHILL, J., HU, W., DAVIDSON, J., KNIGHT, J., NGUYEN-TUONG, A., AND HISER, J. 2006. N-Variant systems: A secretless framework for security through diversity. In Proceedings of the 15th USENIX Security Symposium. 105-120.
-
(2006)
Proceedings of the 15th USENIX Security Symposium
, pp. 105-120
-
-
Cox, B.1
Evans, D.2
Filipi, A.3
Rowanhill, J.4
U, W.H.5
Davidson, J.6
Knight, J.7
Nguyen-Tuong, A.8
Hiser, J.9
-
17
-
-
67049117702
-
Instruction set limitation in support of software diversity
-
Springer
-
DE SUTTER, B., ANCKAERT, B., GEIREGAT, J., CHANET, D., AND DE BOSSCHERE, K. 2008. Instruction set limitation in support of software diversity. In Proceedings of the 11th International Conference on Information Security and Cryptology (ICISC'08). Lecture Notes in Computer Science, Vol.5461. Springer, 152-165.
-
(2008)
Proceedings of the 11th International Conference on Information Security and Cryptology (ICISC'08). Lecture Notes in Computer Science
, vol.5461
, pp. 152-165
-
-
De Sutter, B.1
Anckaert, B.2
Geiregat, J.3
Chanet, D.4
De Bosschere, K.5
-
26
-
-
70349147977
-
-
McGraw-Hill
-
HARRIS, S., HARPER, A., EAGLE, C., AND NESS, J. 2008. Gray Hat Hacking: The Ethical Hacker's Handbook. McGraw-Hill.
-
(2008)
Gray Hat Hacking: The Ethical Hacker's Handbook
-
-
Harris, S.1
Harper, A.2
Eagle, C.3
Ness, J.4
-
32
-
-
84861129082
-
Improved malware classification through sensor fusion using disjoint union
-
LEDOUX, C., WALENSTEIN, A., AND LAKHOTIA, A. 2012. Improved malware classification through sensor fusion using disjoint union. In Proceedings of the 6th International Conference on Information Systems, Technology and Management (ICISTM). 360-371.
-
(2012)
Proceedings of the 6th International Conference on Information Systems, Technology and Management (ICISTM)
, pp. 360-371
-
-
Ledoux, C.1
Walenstein, A.2
Lakhotia, A.3
-
36
-
-
33745812845
-
Hybrid static-dynamic attacks against software protection mechanisms
-
MADOU, M., ANCKAERT, B., DE SUTTER, B., AND DE BOSSCHERE, K. 2005. Hybrid static-dynamic attacks against software protection mechanisms. In Proceedings of the 5th ACM Workshop on Digital Rights Management. 75-82.
-
(2005)
Proceedings of the 5th ACM Workshop on Digital Rights Management
, pp. 75-82
-
-
Madou, M.1
Anckaert, B.2
De Sutter, B.3
De Bosschere, K.4
-
37
-
-
0022161646
-
A file comparison program
-
MILLER, W. AND MYERS, E. 1985. A file comparison program. Softw. Pract. Exper. 15, 11, 1025-1040.
-
(1985)
Softw. Pract. Exper.
, vol.15
, Issue.11
, pp. 1025-1040
-
-
Miller, W.1
Myers, E.2
-
38
-
-
84872971161
-
-
MOORE, H. 2008. Exploiting IIS via HTMLEncode (MS08-006). https://strikecenter.bpointsys.com/articles/permalink?month=02&year= 2008&title=Exploiting-lis-via-html-encode-ms08-006&day=13.
-
(2008)
Exploiting IIS Via HTMLEncode (MS08-006)
-
-
Moore, H.1
-
39
-
-
47349133463
-
Matching control flow of program versions
-
NAGARAJAN, V., ZHANG, X., GUPTA, R., MADOU, M., DE SUTTER, B., AND DE BOSSCHERE, K. 2007. Matching control flow of program versions. In Proceedings of the 23rd IEEE International Conference on Software Maintenance. 83-94.
-
(2007)
Proceedings of the 23rd IEEE International Conference on Software Maintenance
, pp. 83-94
-
-
Nagarajan, V.1
Zhang, X.2
Gupta, R.3
Madou, M.4
De Sutter, B.5
De Bosschere, K.6
-
41
-
-
84872969630
-
Fight against 1-day exploits: Diffing binaries vs anti-diffing binaries
-
OH, J. 2009. Fight against 1-day exploits: Diffing binaries vs anti-diffing binaries. In BlackHat USA. http://www.blackhat.com/html/bh-usa-09/ bh-usa-09-archives.html.
-
(2009)
BlackHat USA
-
-
H, J.O.1
-
45
-
-
14844328033
-
On the effectiveness of addressspace randomization
-
ACM Press
-
SHACHAM, H., PAGE, M., PFAFF, B., GOH, E.-J., MODADUGU, N., ANDBONEH, D. 2004. On the effectiveness of addressspace randomization. In Proceedings of the 11th ACM Conference on Computer and Communications Security. ACM Press, 298-307.
-
(2004)
Proceedings of the 11th ACM Conference on Computer and Communications Security
, pp. 298-307
-
-
Shacham, H.1
Page, M.2
Pfaff, B.3
Goh, E.-J.4
Modadugu, N.5
Andboneh, D.6
-
46
-
-
70449644479
-
Automatic reverse engineering of malware emulators
-
SHARIF, M., LANZI, A., GRIFFIN, J., AND LEE, W. 2009. Automatic reverse engineering of malware emulators. In Proceedings of the IEEE Symposium on Security and Privacy.
-
(2009)
Proceedings of the IEEE Symposium on Security and Privacy
-
-
Sharif, M.1
Lanzi, A.2
Griffin, J.3
Lee, W.4
-
47
-
-
84872920384
-
-
SLAWLERGUY
-
SLAWLERGUY. 2008. Reversing the ms08-067 patch. http:// dontstoffbearsuppurpose.com/2008/10/23/lookingat-ms08-067/.
-
(2008)
Reversing the ms08-067 Patch
-
-
-
51
-
-
0015960104
-
The string-to-string correction problem
-
WAGNER, R. AND FISCHER, M. 1974. The string-to-string correction problem. J. ACM 21, 1, 168-173.
-
(1974)
J. ACM
, vol.21
, Issue.1
, pp. 168-173
-
-
Wagner, R.1
Fischer, M.2
-
52
-
-
54849442042
-
Constructing malware normalizers using term rewriting
-
WALENSTEIN, A., MATHUR, R., CHOUCHANE, M. R., AND LAKHOTIA, A. 2008. Constructing malware normalizers using term rewriting. J. Comput. Virol. 4, 4, 307-322.
-
(2008)
J. Comput. Virol.
, vol.4
, Issue.4
, pp. 307-322
-
-
Walenstein, A.1
Mathur, R.2
Chouchane, M.R.3
Lakhotia, A.4
-
54
-
-
0035789216
-
Protection of software-based survivability mechanisms
-
IEEE Computer Society Press
-
WANG, C., DAVIDSON, J., HILL, J., AND KNIGHT, J. 2001. Protection of software-based survivability mechanisms. In Proceedings of the 2nd International Conference of Dependable Systems and Networks. IEEE Computer Society Press, 193-202.
-
(2001)
Proceedings of the 2nd International Conference of Dependable Systems and Networks
, pp. 193-202
-
-
Wang, C.1
Davidson, J.2
Hill, J.3
Knight, J.4
-
55
-
-
0013143403
-
Bmat-A binary matching tools for stale profile propagation
-
WANG, Z., PIERCE, K., AND MCFARLING, S. 2000. Bmat-a binary matching tools for stale profile propagation. J. Instruct. Level Parallel. 2, 1-20.
-
(2000)
J. Instruct. Level Parallel.
, vol.2
, pp. 1-20
-
-
Wang, Z.1
Pierce, K.2
McFarling, S.3
-
57
-
-
84997350878
-
Whole execution traces and their applications
-
ZHANG, X. AND GUPTA, R. 2005b. Whole execution traces and their applications. ACM Trans. Archit. Code Optim. 2, 3, 301-334.
-
(2005)
ACM Trans. Archit. Code Optim.
, vol.2
, Issue.3
, pp. 301-334
-
-
Zhang, X.1
Gupta, R.2
-
58
-
-
34547467422
-
Diversity via code transformations: A solution for NGNA renewable security
-
ZHOU, Y. AND MAIN, A. 2006. Diversity via code transformations: A solution for NGNA renewable security. In NCTA-The National Show.
-
(2006)
NCTA-The National Show
-
-
Zhou, Y.1
Main, A.2
-
59
-
-
84872942112
-
-
ZYNAMICS BinDiff
-
ZYNAMICS. 2012a. BinDiff. http://www.zynamics.com/bindiff.html.
-
(2012)
-
-
|