-
1
-
-
85156147536
-
Impeding malware analysis using conditional code obfuscation
-
M. I. Sharif, A. Lanzi, J. T. Giffin, and W. Lee, "Impeding Malware Analysis Using Conditional Code Obfuscation," in Network and Distributed System Security Symposium (NDSS), 2008.
-
(2008)
Network and Distributed System Security Symposium (NDSS)
-
-
Sharif, M.I.1
Lanzi, A.2
Giffin, J.T.3
Lee, W.4
-
3
-
-
48649087530
-
Limits of static analysis for malware detection
-
IEEE Computer Society
-
A. Moser, C. Kruegel, and E. Kirda. Limits of Static Analysis for Malware Detection. In ACSAC, pages 421-430. IEEE Computer Society, 2007.
-
(2007)
ACSAC
, pp. 421-430
-
-
Moser, A.1
Kruegel, C.2
Kirda, E.3
-
5
-
-
84862111617
-
Constructing precise control flow graphs from binaries
-
Department of Computer Science, UC Davis
-
Liang Xu, Fangqi Sun, and Zhendong Su. Constructing precise control flow graphs from binaries. Technical report CSE-2009-27, Department of Computer Science, UC Davis, 2009.
-
(2009)
Technical Report CSE-2009-27
-
-
Xu, L.1
Sun, F.2
Su, Z.3
-
6
-
-
40349109005
-
Pathex-pander: Architectural support for increasing the path coverage of dynamic bug detection
-
S. Lu, P. Zhou, W. Liu, Y. Zhou, and J. Torrellas. PathEx-pander: Architectural Support for Increasing the Path Coverage of Dynamic Bug Detection. In Proceedings of the 39th Annual IEEE/ACM International Symposium on Micro-architecture (MICRO), 2006.
-
(2006)
Proceedings of the 39th Annual IEEE/ACM International Symposium on Micro-architecture (MICRO)
-
-
Lu, S.1
Zhou, P.2
Liu, W.3
Zhou, Y.4
Torrellas, J.5
-
7
-
-
77954996346
-
-
Botnet Detection
-
D. Brumley, C. Hartwig, Z. Liang, J. Newsome, D. Song, and H. Yin. Automatically identifying trigger-based behavior in malware. Botnet Detection, 2008.
-
(2008)
Automatically Identifying Trigger-based Behavior in Malware
-
-
Brumley, D.1
Hartwig, C.2
Liang, Z.3
Newsome, J.4
Song, D.5
Yin, H.6
-
9
-
-
80755187788
-
Android permissions demystified
-
New York, NY, USA
-
A. P. Felt, E. Chin, S. Hanna, D. Song, and D. Wagner. Android permissions demystified. In Proceedings of the 18th ACM conference on Computer and Communications Security, CCS 11, pages 627-638, New York, NY, USA, 2011.
-
(2011)
Proceedings of the 18th ACM Conference on Computer and Communications Security, CCS
, vol.11
, pp. 627-638
-
-
Felt, A.P.1
Chin, E.2
Hanna, S.3
Song, D.4
Wagner, D.5
-
12
-
-
85076889619
-
Taintdroid: An informationflow tracking system for realtime privacy monitoring on smartphones
-
August
-
W. Enck, P. Gilbert, B. gon Chun, L. P. Cox, J. Jung, P. McDaniel, and A. N. Sheth. Taintdroid: An informationflow tracking system for realtime privacy monitoring on smartphones. In Proceedings of the 9th Usenix Symposium on Operating Systems Design and Implementation, pages 393-408, August 2010.
-
(2010)
Proceedings of the 9th Usenix Symposium on Operating Systems Design and Implementation
, pp. 393-408
-
-
Enck, W.1
Gilbert, P.2
Gon Chun, B.3
Cox, L.P.4
Jung, J.5
McDaniel, P.6
Sheth, A.N.7
-
15
-
-
84856551625
-
Kernel-based behavior analysis for android malware detection
-
Takamasa Isohara, Keisuke Takemori, Ayumu Kubota: Kernel-based Behavior Analysis for Android Malware Detection. CIS 2011, pp.1011-1015.
-
(2011)
CIS
, pp. 1011-1015
-
-
Isohara, T.1
Takemori, K.2
Kubota, A.3
|