-
1
-
-
65149100972
-
Ttanalyze: A tool for analyzing malware
-
Hamburg, Germany, Apr
-
U. Bayer, C. Kruegel, and E. Kirda. TTAnalyze: A tool for analyzing malware. In 15th European Institute for Computer Antivirus Research (EICAR) Annual Conference, Hamburg, Germany, Apr. 2006.
-
(2006)
15th European Institute for Computer Antivirus Research (EICAR) Annual Conference
-
-
Bayer, U.1
Kruegel, C.2
Kirda, E.3
-
2
-
-
85043201839
-
Scalable, behavior-based malware clustering
-
U. Bayer, P. Milani, C. Hlauschek, C. Kruegel, and E. Kirda. Scalable, behavior-based malware clustering. In 16th Annual Network and Distributed System Security Symposium (NDSS), 2009.
-
(2009)
16th Annual Network and Distributed System Security Symposium (NDSS)
-
-
Bayer, U.1
Milani, P.2
Hlauschek, C.3
Kruegel, C.4
Kirda, E.5
-
5
-
-
70450092967
-
Bouncer: Securing software by blocking bad input
-
M. Costa, M. Castro, L. Zhou, L. Zhang, and M. Peinado. Bouncer: Securing software by blocking bad input. In 21st ACM Symposium on Operating Systems Principles (SOSP), 2007.
-
(2007)
21st ACM Symposium on Operating Systems Principles (SOSP)
-
-
Costa, M.1
Castro, M.2
Zhou, L.3
Zhang, L.4
Peinado, M.5
-
7
-
-
39049086327
-
Back to the future: A framework for automatic malware removal and system repair
-
F. Hsu, H. Chen, T. Ristenpart, J. Li, and Z. Su. Back to the future: A framework for automatic malware removal and system repair. In 22nd Annual Computer Security Applications Conference (ACSAC), 2006.
-
(2006)
22nd Annual Computer Security Applications Conference (ACSAC)
-
-
Hsu, F.1
Chen, H.2
Ristenpart, T.3
Li, J.4
Su, Z.5
-
8
-
-
85076206522
-
Effective and efficient malware detection at the end host
-
C. Kolbitsch, P. M. Comparetti, C. Kruegel, E. Kirda, X. Zhou, and X. Wang. Effective and efficient malware detection at the end host. In USENIX Security Symposium, 2009.
-
(2009)
USENIX Security Symposium
-
-
Kolbitsch, C.1
Comparetti, P.M.2
Kruegel, C.3
Kirda, E.4
Zhou, X.5
Wang, X.6
-
9
-
-
33751064824
-
Hamsa: Fast signature generation for zero-day polymorphic worms with provable attack resilience
-
Oakland, California
-
Z. Li, M. Sanghi, Y. Chen, M.-Y. Kao, and B. Chavez. Hamsa: Fast signature generation for zero-day polymorphic worms with provable attack resilience. In IEEE Symposium on Security and Privacy, Oakland, California, 2006.
-
(2006)
IEEE Symposium on Security and Privacy
-
-
Li, Z.1
Sanghi, M.2
Chen, Y.3
Kao, M.-Y.4
Chavez, B.5
-
11
-
-
78049387622
-
A layered architecture for detecting malicious behaviors
-
Sept
-
L. Martignoni, E. Stinson, M. Fredrikson, S. Jha, and J. C. Mitchell. A layered architecture for detecting malicious behaviors. In International Symposium on Recent Advances in Intrusion Detection (RAID), Sept. 2008.
-
(2008)
International Symposium on Recent Advances in Intrusion Detection (RAID)
-
-
Martignoni, L.1
Stinson, E.2
Fredrikson, M.3
Jha, S.4
Mitchell, J.C.5
-
14
-
-
27544498978
-
PolyGraph: Automatically generating signatures for polymorphic worms
-
Oakland, California
-
J. Newsome, B. Karp, and D. Song. Polygraph: Automatically generating signatures for polymorphic worms. In IEEE Symposium on Security and Privacy, Oakland, California, 2005.
-
(2005)
IEEE Symposium on Security and Privacy
-
-
Newsome, J.1
Karp, B.2
Song, D.3
-
15
-
-
85076281968
-
How good are malware detectors at remediating infected systems?
-
Como, Italy, July
-
E. Passerini, R. Paleari, and L. Martignoni. How good are malware detectors at remediating infected systems? In 6th Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA), Como, Italy, July 2009.
-
(2009)
6th Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA)
-
-
Passerini, E.1
Paleari, R.2
Martignoni, L.3
-
16
-
-
51849164885
-
A semantics-based approach to malware detection
-
Aug
-
M. D. Preda, M. Christodorescu, S. Jha, and S. Debray. A semantics-based approach to malware detection. ACM Transactions on Programming Languages and Systems, 30(5):25.1–25.54, Aug. 2008.
-
(2008)
ACM Transactions on Programming Languages and Systems
, vol.30
, Issue.5
, pp. 2512-2554
-
-
Preda, M.D.1
Christodorescu, M.2
Jha, S.3
Debray, S.4
-
17
-
-
22444452019
-
A beam search algorithm for PFSA inference
-
A. Raman, P. Andreae, and J. Patrick. A beam search algorithm for PFSA inference. Pattern Analysis and Applications, 1(2):121–129, 1998.
-
(1998)
Pattern Analysis and Applications
, vol.1
, Issue.2
, pp. 121-129
-
-
Raman, A.1
Andreae, P.2
Patrick, J.3
-
18
-
-
49949090311
-
Learning and classification of malware behavior
-
K. Rieck, T. Holz, C. Willems, P. Düssel, and P. Laskov. Learning and classification of malware behavior. In 5th Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA), 2008.
-
(2008)
5th Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA)
-
-
Rieck, K.1
Holz, T.2
Willems, C.3
Düssel, P.4
Laskov, P.5
-
20
-
-
84923445084
-
An architecture for generating semantics-aware signatures
-
Baltimore, MD
-
V. Yegneswaran, J. T. Giffin, P. Barford, and S. Jha. An architecture for generating semantics-aware signatures. In 14th USENIX Security Symposium, Baltimore, MD, 2005.
-
(2005)
14th USENIX Security Symposium
-
-
Yegneswaran, V.1
Giffin, J.T.2
Barford, P.3
Jha, S.4
-
21
-
-
77950788046
-
Panorama: Capturing system-wide information flow for malware detection and analysis
-
Alexandria, VA
-
H. Yin, D. Song, M. Egele, E. Kirda, and C. Kruegel. Panorama: Capturing system-wide information flow for malware detection and analysis. In 14th ACM Conference on Computer and Communications Security (CCS), Alexandria, VA, 2007.
-
(2007)
14th ACM Conference on Computer and Communications Security (CCS)
-
-
Yin, H.1
Song, D.2
Egele, M.3
Kirda, E.4
Kruegel, C.5
|