-
1
-
-
84878352084
-
-
S. Alvarez. Antivirus insecurity. http://events.ccc.de/camp/2007/ Fahrplan/attachments/1324-AntivirusInSecuritySergioshadownAlvarez.pdf, 2007.
-
(2007)
Antivirus Insecurity
-
-
Alvarez, S.1
-
4
-
-
70449629310
-
Secure content sniffing for web browsers, or how to stop papers from reviewing themselves
-
A. Barth, J. Caballero, and D. Song. Secure content sniffing for web browsers, or how to stop papers from reviewing themselves. In S&P, 2009.
-
(2009)
S&P
-
-
Barth, A.1
Caballero, J.2
Song, D.3
-
5
-
-
77954612255
-
Regular expressions considered harmful in client-side XSS filters
-
D. Bates, A. Barth, and C. Jackson. Regular expressions considered harmful in client-side XSS filters. In WWW, 2010.
-
(2010)
WWW
-
-
Bates, D.1
Barth, A.2
Jackson, C.3
-
6
-
-
85077688456
-
Towards automatic discovery of deviations in binary implementations with applications to error detection and fingerprint generation
-
D. Brumley, J. Caballero, Z. Liang, J. Newsome, and D. Song. Towards automatic discovery of deviations in binary implementations with applications to error detection and fingerprint generation. In USENIX Security, 2007.
-
(2007)
USENIX Security
-
-
Brumley, D.1
Caballero, J.2
Liang, Z.3
Newsome, J.4
Song, D.5
-
7
-
-
67650790221
-
KLEE: Unassisted and automatic generation of high-coverage tests for complex systems programs
-
C. Cadar, D. Dunbar, and D. Engler. KLEE: Unassisted and automatic generation of high-coverage tests for complex systems programs. In OSDI, 2008.
-
(2008)
OSDI
-
-
Cadar, C.1
Dunbar, D.2
Engler, D.3
-
8
-
-
53349116756
-
Towards an understanding of anti-virtualization and anti-debugging behavior in modern malware
-
X. Chen, J. Andersen, Z. Mao, M. Bailey, and J. Nazario. Towards an understanding of anti-virtualization and anti-debugging behavior in modern malware. In DSN, 2008.
-
(2008)
DSN
-
-
Chen, X.1
Andersen, J.2
Mao, Z.3
Bailey, M.4
Nazario, J.5
-
10
-
-
85175130093
-
-
http://cve.mitre.org/cgi-bin/cvekey.cgi?keyword=evasion, 2012.
-
(2012)
-
-
-
12
-
-
85180527583
-
Traps and pitfalls: Practical problems in system call interposition based security tools
-
T. Garfinkel. Traps and pitfalls: Practical problems in system call interposition based security tools. In NDSS, 2003.
-
(2003)
NDSS
-
-
Garfinkel, T.1
-
13
-
-
85080362568
-
A virtual machine introspection based architecture for intrusion detection
-
T. Garfinkel and M. Rosenblum. A virtual machine introspection based architecture for intrusion detection. In NDSS, 2003.
-
(2003)
NDSS
-
-
Garfinkel, T.1
Rosenblum, M.2
-
15
-
-
84970882954
-
Fast and precise sanitizer analysis with BEK
-
P. Hooimeijer, B. Livshits, D. Molnar, P. Saxena, and M. Veanes. Fast and precise sanitizer analysis with BEK. In USENIX Security, 2011.
-
(2011)
USENIX Security
-
-
Hooimeijer, P.1
Livshits, B.2
Molnar, D.3
Saxena, P.4
Veanes, M.5
-
18
-
-
85175131551
-
-
McAfee VirusScan vulnerability. http://www.pc1news.com/news/0665/ mcafeevirusscanvulnerability-allow-compressed-archives-to-bypass-the-scan- engine.html, 2009.
-
(2009)
McAfee VirusScan Vulnerability
-
-
-
20
-
-
85084161406
-
PolyPack: An automated online packing service for optimal antivirus evasion
-
J. Oberheide, M. Bailey, and F. Jahanian. PolyPack: An automated online packing service for optimal antivirus evasion. In WOOT, 2009.
-
(2009)
WOOT
-
-
Oberheide, J.1
Bailey, M.2
Jahanian, F.3
-
28
-
-
84870818497
-
Quo vadis? A study of the evolution of input validation vulnerabilities in Web applications
-
T. Scholte, D. Balzarotti, and E. Kirda. Quo vadis? A study of the evolution of input validation vulnerabilities in Web applications. In FC, 2011.
-
(2011)
FC
-
-
Scholte, T.1
Balzarotti, D.2
Kirda, E.3
-
30
-
-
85175132385
-
-
IE content-type logic. http://blogs.msdn.com/b/ie/archive/2005/02/01/ 364581.aspx, 2005.
-
(2005)
IE Content-type Logic
-
-
-
32
-
-
84878358066
-
-
Virus Total. http://www.virustotal.com.
-
Virus Total
-
-
-
34
-
-
85084162296
-
Exploiting concurrency vulnerabilities in system call wrappers
-
R. Watson. Exploiting concurrency vulnerabilities in system call wrappers. In WOOT, 2007.
-
(2007)
WOOT
-
-
Watson, R.1
-
35
-
-
84869476644
-
A systematic analysis of XSS sanitization in Web application frameworks
-
J. Weinberger, P. Saxena, D. Akhawe, M. Finifter, R. Shin, and D. Song. A systematic analysis of XSS sanitization in Web application frameworks. In ESORICS, 2011.
-
(2011)
ESORICS
-
-
Weinberger, J.1
Saxena, P.2
Akhawe, D.3
Finifter, M.4
Shin, R.5
Song, D.6
-
36
-
-
85175131416
-
-
A. Wheeler and N. Mehta. 0wning antivirus. http://www.blackhat.com/ presentations/bh-europe-05/bh-eu-05-wheeler-mehta-up.pdf, 2005.
-
(2005)
0wning Antivirus
-
-
Wheeler, A.1
Mehta, N.2
-
37
-
-
84908489837
-
-
F. Xue. Attacking antivirus. http://www.blackhat.com/presentations/bh- europe-08/Feng-Xue/Whitepaper/bh-eu-08-xue-WP.pdf, 2008.
-
(2008)
Attacking Antivirus
-
-
Xue, F.1
|