-
1
-
-
84877955890
-
-
Contagio. http://contagiodump.blogspot.it.
-
-
-
-
2
-
-
84877933177
-
-
Malware tracker. http://www.malwaretracker.com/pdfthreat.php.
-
-
-
-
4
-
-
84877962192
-
-
Origami framework. Http://esec-lab.sogeti.com/pages/Origami.
-
Origami Framework
-
-
-
5
-
-
84877966499
-
-
Pdf tools. http://blog.didierstevens.com/programs/pdf-tools/.
-
Pdf Tools
-
-
-
6
-
-
84877970857
-
-
Pdfrate. http://pdfrate.com.
-
-
-
-
7
-
-
84877961773
-
-
Peepdf. Http://eternal-todo.com/tools/peepdf-pdf-analysis-tool.
-
Peepdf
-
-
-
8
-
-
84877975008
-
-
Pypdf. http://pybrary.net/pyPdf/.
-
Pypdf
-
-
-
10
-
-
84877989837
-
-
Wepawet. Http://wepawet.iseclab.org/index.php.
-
-
-
-
13
-
-
84877986769
-
-
November
-
Foxit reader stack overflow exploit. http://www.exploit-db.com/foxit- reader-stack-overflow-exploit-egghunter/, November 2010.
-
(2010)
Foxit Reader Stack Overflow Exploit
-
-
-
16
-
-
84864919846
-
Jit spraying and mitigations
-
P. Bania. Jit spraying and mitigations. CoRR, http://www.piotrbania.com/ all/articles/pbania-jit-mitigations2010.pdf, 2010.
-
(2010)
CoRR
-
-
Bania, P.1
-
18
-
-
84873447654
-
Prophiler: A fast filter for the large-scale detection of malicious web pages
-
New York, NY, USA, ACM
-
D. Canali, M. Cova, G. Vigna, and C. Kruegel. Prophiler: a fast filter for the large-scale detection of malicious web pages. In Proceedings of the 20th international conference on World wide web, WWW '11, pages 197-206, New York, NY, USA, 2011. ACM.
-
(2011)
Proceedings of the 20th International Conference on World Wide Web, WWW '11
, pp. 197-206
-
-
Canali, D.1
Cova, M.2
Vigna, G.3
Kruegel, C.4
-
19
-
-
77954566293
-
Detection and analysis of drive-by-download attacks and malicious javascript code
-
New York, NY, USA, ACM
-
M. Cova, C. Kruegel, and G. Vigna. Detection and analysis of drive-by-download attacks and malicious javascript code. In Proceedings of the 19th international conference on World wide web, WWW '10, pages 281-290, New York, NY, USA, 2010. ACM.
-
(2010)
Proceedings of the 19th International Conference on World Wide Web, WWW '10
, pp. 281-290
-
-
Cova, M.1
Kruegel, C.2
Vigna, G.3
-
21
-
-
85076498355
-
Zozzle: Fast and precise in-browser javascript malware detection
-
Berkeley, CA, USA, USENIX Association
-
C. Curtsinger, B. Livshits, B. Zorn, and C. Seifert. Zozzle: fast and precise in-browser javascript malware detection. In Proceedings of the 20th USENIX conference on Security, SEC'11, pages 3-3, Berkeley, CA, USA, 2011. USENIX Association.
-
(2011)
Proceedings of the 20th USENIX Conference on Security, SEC'11
, pp. 3-3
-
-
Curtsinger, C.1
Livshits, B.2
Zorn, B.3
Seifert, C.4
-
22
-
-
84938793150
-
Detecting malicious documents with combined static and dynamic analysis
-
Technical report
-
M. Engleberth, C. Willems, and T. Holz. Detecting malicious documents with combined static and dynamic analysis. Technical report, Virus Bulletin, 2009.
-
(2009)
Virus Bulletin
-
-
Engleberth, M.1
Willems, C.2
Holz, T.3
-
23
-
-
84876950829
-
Abusing file processing in malware detectors for fun and profit
-
S. Jana and V. Shmatikov. Abusing file processing in malware detectors for fun and profit. In IEEE Symposium on Security and Privacy, pages 80-94, 2012.
-
(2012)
IEEE Symposium on Security and Privacy
, pp. 80-94
-
-
Jana, S.1
Shmatikov, V.2
-
24
-
-
84855698589
-
Static detection of malicious javascript-bearing pdf documents
-
New York, NY, USA, ACM
-
P. Laskov and N. Šrndić. Static detection of malicious javascript-bearing pdf documents. In Proceedings of the 27th Annual Computer Security Applications Conference, ACSAC '11, pages 373-382, New York, NY, USA, 2011. ACM.
-
(2011)
Proceedings of the 27th Annual Computer Security Applications Conference, ACSAC '11
, pp. 373-382
-
-
Laskov, P.1
Šrndić, N.2
-
25
-
-
38049030703
-
A study of malcode-bearing documents
-
Berlin, Heidelberg, Springer-Verlag
-
W.-J. Li, S. Stolfo, A. Stavrou, E. Androulaki, and A. D. Keromytis. A study of malcode-bearing documents. In Proceedings of the 4th international conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA '07, pages 231-250, Berlin, Heidelberg, 2007. Springer-Verlag.
-
(2007)
Proceedings of the 4th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA '07
, pp. 231-250
-
-
Li, W.-J.1
Stolfo, S.2
Stavrou, A.3
Androulaki, E.4
Keromytis, A.D.5
-
26
-
-
84864937789
-
A pattern recognition system for malicious pdf files detection
-
Berlin, Heidelberg, Springer-Verlag
-
D. Maiorca, G. Giacinto, and I. Corona. A pattern recognition system for malicious pdf files detection. In Proceedings of the 8th international conference on Machine Learning and Data Mining in Pattern Recognition, MLDM'12, pages 510-524, Berlin, Heidelberg, 2012. Springer-Verlag.
-
(2012)
Proceedings of the 8th International Conference on Machine Learning and Data Mining in Pattern Recognition, MLDM'12
, pp. 510-524
-
-
Maiorca, D.1
Giacinto, G.2
Corona, I.3
-
29
-
-
84924734121
-
Nozzle: A defense against heap-spraying code injection attacks
-
Berkeley, CA, USA, USENIX Association
-
P. Ratanaworabhan, B. Livshits, and B. Zorn. Nozzle: a defense against heap-spraying code injection attacks. In Proceedings of the 18th conference on USENIX security symposium, SSYM'09, pages 169-186, Berkeley, CA, USA, 2009. USENIX Association.
-
(2009)
Proceedings of the 18th Conference on USENIX Security Symposium, SSYM'09
, pp. 169-186
-
-
Ratanaworabhan, P.1
Livshits, B.2
Zorn, B.3
-
30
-
-
49949090311
-
Learning and classification of malware behavior
-
Berlin, Heidelberg, Springer-Verlag
-
K. Rieck, T. Holz, C. Willems, P. Düssel, and P. Laskov. Learning and classification of malware behavior. In Proceedings of the 5th international conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA '08, pages 108-125, Berlin, Heidelberg, 2008. Springer-Verlag.
-
(2008)
Proceedings of the 5th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA '08
, pp. 108-125
-
-
Rieck, K.1
Holz, T.2
Willems, C.3
Düssel, P.4
Laskov, P.5
-
31
-
-
78751553658
-
Cujo: Efficient detection and prevention of drive-by-download attacks
-
New York, NY, USA, ACM
-
K. Rieck, T. Krueger, and A. Dewald. Cujo: efficient detection and prevention of drive-by-download attacks. In Proceedings of the 26th Annual Computer Security Applications Conference, ACSAC '10, pages 31-39, New York, NY, USA, 2010. ACM.
-
(2010)
Proceedings of the 26th Annual Computer Security Applications Conference, ACSAC '10
, pp. 31-39
-
-
Rieck, K.1
Krueger, T.2
Dewald, A.3
-
32
-
-
49949094798
-
Embedded malware detection using markov n-grams
-
Berlin, Heidelberg, Springer-Verlag
-
M. Z. Shafiq, S. A. Khayam, and M. Farooq. Embedded malware detection using markov n-grams. In Proceedings of the 5th international conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA '08, pages 88-107, Berlin, Heidelberg, 2008. Springer-Verlag.
-
(2008)
Proceedings of the 5th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA '08
, pp. 88-107
-
-
Shafiq, M.Z.1
Khayam, S.A.2
Farooq, M.3
-
34
-
-
85076498362
-
Shellos: Enabling fast detection and forensic analysis of code injection attacks
-
K. Z. Snow, S. Krishnan, F. Monrose, and N. Provos. Shellos: enabling fast detection and forensic analysis of code injection attacks. In Proceedings of the 20th USENIX conference on Security, SEC'11, 2011.
-
Proceedings of the 20th USENIX Conference on Security, SEC'11, 2011
-
-
Snow, K.Z.1
Krishnan, S.2
Monrose, F.3
Provos, N.4
-
35
-
-
79956041040
-
-
D. Stevens. Escape from pdf. http://blog.didierstevens.com/2010/03/29/ escape-from-pdf/, 2010.
-
(2010)
Escape from Pdf
-
-
Stevens, D.1
-
37
-
-
79551643515
-
Malicious pdf documents explained
-
Jan.
-
D. Stevens. Malicious pdf documents explained. IEEE Security and Privacy, 9(1):80-82, Jan. 2011.
-
(2011)
IEEE Security and Privacy
, vol.9
, Issue.1
, pp. 80-82
-
-
Stevens, D.1
-
38
-
-
70449633109
-
Malware detection using statistical analysis of byte-level file content
-
New York, NY, USA, ACM
-
S. M. Tabish, M. Z. Shafiq, and M. Farooq. Malware detection using statistical analysis of byte-level file content. In Proceedings of the ACM SIGKDD Workshop on CyberSecurity and Intelligence Informatics, CSI-KDD '09, pages 23-31, New York, NY, USA, 2009. ACM.
-
(2009)
Proceedings of the ACM SIGKDD Workshop on CyberSecurity and Intelligence Informatics, CSI-KDD '09
, pp. 23-31
-
-
Tabish, S.M.1
Shafiq, M.Z.2
Farooq, M.3
-
39
-
-
79957806740
-
Combining static and dynamic analysis for the detection of malicious documents
-
New York, NY, USA, ACM
-
Z. Tzermias, G. Sykiotakis, M. Polychronakis, and E. P. Markatos. Combining static and dynamic analysis for the detection of malicious documents. In Proceedings of the Fourth European Workshop on System Security, EUROSEC '11, pages 4:1-4:6, New York, NY, USA, 2011. ACM.
-
(2011)
Proceedings of the Fourth European Workshop on System Security, EUROSEC '11
-
-
Tzermias, Z.1
Sykiotakis, G.2
Polychronakis, M.3
Markatos, E.P.4
-
41
-
-
34047110218
-
Toward automated dynamic malware analysis using cwsandbox
-
March
-
C. Willems, T. Holz, and F. Freiling. Toward automated dynamic malware analysis using cwsandbox. IEEE Security and Privacy, 5(2), March 2007.
-
(2007)
IEEE Security and Privacy
, vol.5
, Issue.2
-
-
Willems, C.1
Holz, T.2
Freiling, F.3
-
42
-
-
84877946763
-
-
December
-
Yahoo. Search api. http://developer.yahoo.com, December 2012.
-
(2012)
Search Api
-
-
|