-
2
-
-
84880572154
-
What APT is (and what it isn't)
-
R. Bejtlich, "What APT is (and what it isn't)," Inform. Security, vol. 12, no. 6, pp. 20-24, 2010.
-
(2010)
Inform. Security
, vol.12
, Issue.6
, pp. 20-24
-
-
Bejtlich, R.1
-
3
-
-
33646414637
-
The art of computer virus research and defense
-
IN Addison-Wesley
-
P. Szor, The Art of Computer Virus Research and Defense. Indianapolis, IN: Addison-Wesley, 2005.
-
(2005)
Indianapolis
-
-
Szor, P.1
-
4
-
-
80052922553
-
SAS: Semantics aware signature generation for polymorphic worm detection
-
D. Kong, Y. Jhi, T. Gong, S. Zhu, P. Liu, and H. Xi, "SAS: Semantics aware signature generation for polymorphic worm detection," Int. J. Inform. Security, vol. 10, no. 5, pp. 269-283, 2011.
-
(2011)
Int. J. Inform. Security
, vol.10
, Issue.5
, pp. 269-283
-
-
Kong, D.1
Jhi, Y.2
Gong, T.3
Zhu, S.4
Liu, P.5
Xi, H.6
-
5
-
-
18844362133
-
N-gram-based detection of new malicious code
-
Proceedings of the 28th Annual International Computer Software and Applications Conference; Workshop Papers and Fast Abstracts, COMPSAC 2004
-
T. Abou-Assaleh, N. Cercone, V. Keselj, and R. Sweidan, "N-grambased detection of new malicious code," in Proc. 28th Ann. Int. Comput. Softw. Appl. Conf., Sep. 2004, pp. 41-42. (Pubitemid 40680776)
-
(2004)
Proceedings - International Computer Software and Applications Conference
, vol.2
, pp. 41-42
-
-
Abou-Assaleh, T.1
Cercone, N.2
Keselj, V.3
Sweidan, R.4
-
6
-
-
34748865971
-
A feature selection and evaluation scheme for computer virus detection
-
Dec
-
O. Henchiri and N. Japkowicz, "A feature selection and evaluation scheme for computer virus detection," in Proc. IEEE 6th Int. Conf. Data Mining, Dec. 2006, pp. 891-895.
-
(2006)
Proc. IEEE 6th Int. Conf. Data Mining
, pp. 891-895
-
-
Henchiri, O.1
Japkowicz, N.2
-
8
-
-
33845768389
-
Learning to detect and classify malicious executables in the wild
-
J. Kolter and M. Maloof, "Learning to detect and classify malicious executables in the wild," J. Mach. Learning Res., vol. 7, pp. 2721-2744, Dec. 2006. (Pubitemid 46011490)
-
(2006)
Journal of Machine Learning Research
, vol.7
, pp. 2721-2744
-
-
Zico Kolter, J.1
Maloof, M.A.2
-
9
-
-
0034838197
-
Data mining methods for detection of new malicious executables
-
M. Schultz, E. Eskin, E. Zadok, and S. Stolfo, "Data mining methods for detection of new malicious executables," in Proc. IEEE Symp. Security Privacy, May 2001, pp. 38-49. (Pubitemid 32882625)
-
(2001)
Proceedings of the IEEE Computer Society Symposium on Research in Security and Privacy
, pp. 38-49
-
-
Schultz, M.G.1
Eskin, E.2
Zadok, E.3
Stolfo, S.J.4
-
10
-
-
84888464159
-
-
Sep 18 [Online]. Available
-
Norman ASA. (2009, Sep. 18). Norman Sandbox [Online]. Available: www.norman.com/technology/norman?sandbox/en-us
-
(2009)
Norman Sandbox
-
-
Norman, A.S.A.1
-
11
-
-
84856009369
-
-
Sunbelt Software Sep 18 [Online]. Available
-
Sunbelt Software. (2009, Sep. 18). Sunbelt cwsandbox [Online]. Available: www.sunbeltsoftware.com/Developer/Sunbelt-CWSandbox/
-
(2009)
Sunbelt Cwsandbox
-
-
-
12
-
-
84855986152
-
-
Feb 18 [Online]. Available
-
ThreatExpert Ltd. (2009, Feb. 18). Automated Threat Analysis [Online]. Available: www.threatexpert.com/
-
(2009)
Automated Threat Analysis
-
-
Ltd, T.1
-
13
-
-
38149089416
-
Automated classification and analysis of Internet malware
-
M. Bailey, J. Oberheide, J. Andersen, and Z. Mao, "Automated classification and analysis of Internet malware," in Proc. 10th Int. Symp. Recent Adv. Intrusion Detection, 2007, pp. 178-197.
-
(2007)
Proc. 10th Int. Symp. Recent Adv. Intrusion Detection
, pp. 178-197
-
-
Bailey, M.1
Oberheide, J.2
Andersen, J.3
Mao, Z.4
-
14
-
-
37849017546
-
Mining specifications of malicious behavior
-
Sep
-
M. Christodorescu, S. Jha, and C. Kruegel, "Mining specifications of malicious behavior," in Proc. 6th Joint Meeting Eur. Softw. Eng. Conf. ACM SIGSOFT Symp. Found. Softw. Eng., Sep. 2007, pp. 5-14.
-
(2007)
Proc. 6th Joint Meeting Eur. Softw. Eng. Conf ACM SIGSOFT Symp. Found. Softw. Eng.
, pp. 5-14
-
-
Christodorescu, M.1
Jha, S.2
Kruegel, C.3
-
15
-
-
70349240080
-
Ether: Malware analysis via hardware virtualization extensions
-
Apr
-
A. Dinaburg, P. Royal, M. Sharif, and W. Lee, "Ether: Malware analysis via hardware virtualization extensions," in Proc. 15th ACM Conf. Comput. Commun. Security, Apr. 2008, pp. 51-62.
-
(2008)
Proc. 15th ACM Conf. Comput. Commun. Security
, pp. 51-62
-
-
Dinaburg, A.1
Royal, P.2
Sharif, M.3
Lee, W.4
-
16
-
-
38149001240
-
Behavioral classification
-
Apr
-
T. Lee and J. J. Mody, "Behavioral classification," in Proc. EICAR, Apr. 2006, pp. 159-174.
-
(2006)
Proc. EICAR
, pp. 159-174
-
-
Lee, T.1
Mody, J.J.2
-
17
-
-
48649087530
-
Limits of static analysis for malware detection
-
A. Moser, C. Kruegel, and E. Kirda, "Limits of static analysis for malware detection," in Proc. ACSAC, 2007, pp. 421-430.
-
(2007)
Proc. ACSAC
, pp. 421-430
-
-
Moser, A.1
Kruegel, C.2
Kirda, E.3
-
18
-
-
84880570814
-
Understanding heuristics: Symantec's bloodhound technology
-
Symantec Corporation
-
Symantec Corporation, "Understanding heuristics: Symantec's bloodhound technology," Symantec White Paper Series, vol. XXXIV, no. 1, pp. 1-14, 1997.
-
(1997)
Symantec White Paper Series
, vol.34
, Issue.1
, pp. 1-14
-
-
-
19
-
-
84856006502
-
Malware target recognition via static heuristics
-
T. Dube, R. Raines, G. Peterson, K. Bauer, M. Grimaila, and S. Rogers, "Malware target recognition via static heuristics," J. Comput. Security, vol. 31, no. 1, pp. 137-147, 2011.
-
(2011)
J. Comput. Security
, vol.31
, Issue.1
, pp. 137-147
-
-
Dube, T.1
Raines, R.2
Peterson, G.3
Bauer, K.4
Grimaila, M.5
Rogers, S.6
-
20
-
-
84866655092
-
String analysis for x86 binaries
-
M. Christodorescu, N. Kidd, and W.-H. Goh, "String analysis for x86 binaries," ACM SIGSOFT Softw. Eng. Notes, vol. 31, no. 1, p. 95, 2006.
-
(2006)
ACM SIGSOFT Softw. Eng. Notes
, vol.31
, Issue.1
, pp. 95
-
-
Christodorescu, M.1
Kidd, N.2
Goh, W.-H.3
-
21
-
-
84855995264
-
Improving heuristics
-
Aug
-
N. Rafiq and Y. Mao, "Improving heuristics," Virus Bull., pp. 9-12, Aug. 2008.
-
(2008)
Virus Bull
, pp. 9-12
-
-
Rafiq, N.1
Mao, Y.2
-
22
-
-
70350057168
-
A heuristic approach for detection of obfuscated malware
-
Jun
-
S. Treadwell and M. Zhou, "A heuristic approach for detection of obfuscated malware," in Proc. Intell. Security Inform., Jun. 2009, pp. 291-299.
-
(2009)
Proc. Intell. Security Inform
, pp. 291-299
-
-
Treadwell, S.1
Zhou, M.2
-
24
-
-
2342473490
-
Automatically generated Win32 heuristic virus detection
-
Sep
-
W. Arnold and G. Tesauro, "Automatically generated Win32 heuristic virus detection," in Proc. Virus Bull. Conf., Sep. 2000, pp. 51-60.
-
(2000)
Proc. Virus Bull. Conf
, pp. 51-60
-
-
Arnold, W.1
Tesauro, G.2
-
25
-
-
0030216542
-
Neural networks for computer virus recognition
-
G. Tesauro, J. Kephart, and G. Sorkin, "Neural networks for computer virus recognition," IEEE Expert, vol. 11, no. 4, pp. 5-6, Aug. 1996. (Pubitemid 126796873)
-
(1996)
IEEE Expert-Intelligent Systems and their Applications
, vol.11
, Issue.4
, pp. 5-6
-
-
Tesauro, G.J.1
Kephart, J.O.2
Sorkin, G.B.3
-
27
-
-
84924223669
-
Static analysis of executables to detect malicious patterns
-
M. Christodorescu and S. Jha, "Static analysis of executables to detect malicious patterns," in Proc. 12th USENIX Security Symp., 2003, pp. 169-186.
-
(2003)
Proc. 12th USENIX Security Symp
, pp. 169-186
-
-
Christodorescu, M.1
Jha, S.2
-
28
-
-
0004046658
-
A taxonomy of obfuscating transformations
-
Dept. Comput. Sci. Univ. Auckland, Auckland, New Zealand Jul
-
C. Collberg, C. Thomborson, and D. Low, "A taxonomy of obfuscating transformations," Dept. Comput. Sci., Univ. Auckland, Auckland, New Zealand, Tech. Rep. 148, Jul. 1997.
-
(1997)
Tech. Rep 148
-
-
Collberg, C.1
Thomborson, C.2
Low, D.3
-
30
-
-
84880574021
-
-
Math Works Inc May 12 [Online] Available
-
MathWorks, Inc. (2010, May 12). TreeBagger [Online]. Available: www. mathworks.com/help/toolbox/stats/treebagger.html
-
(2010)
Tree Bagger
-
-
-
32
-
-
78649268422
-
-
Apr. 15 [Online] Available: vx.netlux.org/vl.php
-
VX Heavens. (2010, Apr. 15). Virus Collection [Online]. Available: vx. netlux.org/vl.php
-
(2010)
Virus Collection
-
-
Heavens, V.X.1
|