-
1
-
-
84881151506
-
The underground economy of fake antivirus software
-
(B. Schneier, ed.) Springer New York
-
B. Stone-Gross, R. Abman, R. Kemmerer, C. Kruegel, D. Steigerwald, and G. Vigna, "The underground economy of fake antivirus software," in Economics of Information Security and Privacy III (B. Schneier, ed.), pp. 55-78, Springer New York, 2013.
-
(2013)
Economics of Information Security and Privacy III
, pp. 55-78
-
-
Stone-Gross, B.1
Abman, R.2
Kemmerer, R.3
Kruegel, C.4
Steigerwald, D.5
Vigna, G.6
-
2
-
-
85064176806
-
Measuring pay-per-install: The commoditization of malware distribution
-
J. Caballero, C. Grier, C. Kreibich, and V. Paxson, "Measuring Pay-per-Install: The commoditization of malware distribution," in Proc. of the 20th USENIX Security Symp., 2011.
-
(2011)
Proc. of the 20th USENIX Security Symp.
-
-
Caballero, J.1
Grier, C.2
Kreibich, C.3
Paxson, V.4
-
3
-
-
84881150021
-
-
Trend Micro Corporation, "Russian underground.,"
-
Trend Micro Corporation, "Russian underground.,"
-
-
-
-
4
-
-
79957616447
-
Stuxnet: Dissecting a cyberwarfare weapon
-
IEEE
-
R. Langner, "Stuxnet: Dissecting a Cyberwarfare Weapon," Security & Privacy, IEEE, Vol. 9, no. 3, pp. 49-51, 2011.
-
(2011)
Security & Privacy
, vol.9
, Issue.3
, pp. 49-51
-
-
Langner, R.1
-
5
-
-
84881131204
-
SKyWIper: A complex malware for targeted attacks
-
Laboratory of Cryptography and System Security (CrySyS Lab) Budapest University of Technology and Economics, May
-
Laboratory of Cryptography and System Security (CrySyS Lab), "sKyWIper: A Complex Malware for Targeted Attacks," Tech. Rep. v1.05, Budapest University of Technology and Economics, May 2012.
-
(2012)
Tech. Rep. V1.05
-
-
-
9
-
-
84876950829
-
Abusing file processing in malware detectors for fun and profit
-
S. Jana and V. Shmatikov, "Abusing file processing in malware detectors for fun and profit," in IEEE Symposium on Security and Privacy, pp. 80-94, 2012.
-
(2012)
IEEE Symposium on Security and Privacy
, pp. 80-94
-
-
Jana, S.1
Shmatikov, V.2
-
11
-
-
78650024495
-
Accessminer: Using system-centric models for malware protection
-
A. Lanzi, D. Balzarotti, C. Kruegel, M. Christodorescu, and E. Kirda, "Accessminer: using system-centric models for malware protection," in Proc. of the 17th ACM conf. on Computer and communications security, pp. 399-412, 2010.
-
(2010)
Proc. of the 17th ACM Conf. on Computer and Communications Security
, pp. 399-412
-
-
Lanzi, A.1
Balzarotti, D.2
Kruegel, C.3
Christodorescu, M.4
Kirda, E.5
-
12
-
-
37849017546
-
Mining specifications of Malicious behavior
-
M. Christodorescu, S. Jha, and C. Kruegel, "Mining specifications of malicious behavior," in Proc. of the the 6th joint meeting of the European software engineering conf. and the ACM SIGSOFT symp. on The foundations of software engineering, ESEC-FSE '07, pp. 5-14, 2007.
-
(2007)
Proc. of the The 6th Joint Meeting of the European Software Engineering Conf. and the ACM SIGSOFT Symp. on the Foundations of Software Engineering, ESEC-FSE '07
, pp. 5-14
-
-
Christodorescu, M.1
Jha, S.2
Kruegel, C.3
-
13
-
-
0029716418
-
A sense of self for unix processes
-
S. Forrest, S. A. Hofmeyr, A. Somayaji, and T. A. Longstaff, "A sense of self for unix processes," in Proc. of the 1996 IEEE Symp. on Security and Privacy, pp. 120-135, 1996.
-
(1996)
Proc. of the 1996 IEEE Symp. on Security and Privacy
, pp. 120-135
-
-
Forrest, S.1
Hofmeyr, S.A.2
Somayaji, A.3
Longstaff, T.A.4
-
14
-
-
0032676506
-
A data mining framework for building intrusion detection models
-
W. Lee, S. J. Stolfo, and K. W. Mok, "A data mining framework for building intrusion detection models," in In IEEE Symposium on Security and Privacy, pp. 120-132, 1999.
-
(1999)
IEEE Symposium on Security and Privacy
, pp. 120-132
-
-
Lee, W.1
Stolfo, S.J.2
Mok, K.W.3
-
15
-
-
49949090311
-
Learning and classification of malware behavior
-
Springer-Verlag
-
K. Rieck, T. Holz, C. Willems, P. Düssel, and P. Laskov, "Learning and classification of malware behavior," in Proc. of the 5th intl. conf. on Detection of Intrusions and Malware, and Vulnerability Assessment, pp. 108-125, Springer-Verlag, 2008.
-
(2008)
Proc. of the 5th Intl. Conf. on Detection of Intrusions and Malware, and Vulnerability Assessment
, pp. 108-125
-
-
Rieck, K.1
Holz, T.2
Willems, C.3
Düssel, P.4
Laskov, P.5
-
16
-
-
38149089416
-
Automated classification and analysis of internet malware
-
Springer-Verlag
-
M. Bailey, J. Oberheide, J. Andersen, Z. M. Mao, F. Jahanian, and J. Nazario, "Automated classification and analysis of internet malware," in Proc. of the 10th intl. conf. on Recent advances in intrusion detection, RAID'07, pp. 178-197, Springer-Verlag, 2007.
-
(2007)
Proc. of the 10th Intl. Conf. on Recent Advances in Intrusion Detection, RAID'07
, pp. 178-197
-
-
Bailey, M.1
Oberheide, J.2
Andersen, J.3
Mao, Z.M.4
Jahanian, F.5
Nazario, J.6
-
17
-
-
85043201839
-
Scalable, behavior-based malware clustering
-
U. Bayer, P. M. Comparetti, C. Hlauschek, C. Krügel, and E. Kirda, "Scalable, behavior-based malware clustering," in Network and Distributed System Security Symposium, 2009.
-
(2009)
Network and Distributed System Security Symposium
-
-
Bayer, U.1
Comparetti, P.M.2
Hlauschek, C.3
Krügel, C.4
Kirda, E.5
-
18
-
-
80755143408
-
Are hardware performance counters a cost effective way for integrity checking of programs
-
C. Malone, M. Zahran, and R. Karri, "Are hardware performance counters a cost effective way for integrity checking of programs," in Proc. of the sixth ACM workshop on Scalable trusted computing, pp. 71-76, 2011.
-
(2011)
Proc. of the Sixth ACM Workshop on Scalable Trusted Computing
, pp. 71-76
-
-
Malone, C.1
Zahran, M.2
Karri, R.3
-
19
-
-
84866672217
-
Cfimon: Detecting violation of control flow integrity using performance counters
-
Y. Xia, Y. Liu, H. Chen, and B. Zang, "Cfimon: Detecting violation of control flow integrity using performance counters," in Proc. of the 2012 42nd Annual IEEE/IFIP Intl. Conf. on Dependable Systems and Networks (DSN), pp. 1-12, 2012.
-
(2012)
Proc. of the 2012 42nd Annual IEEE/IFIP Intl. Conf. on Dependable Systems and Networks (DSN)
, pp. 1-12
-
-
Xia, Y.1
Liu, Y.2
Chen, H.3
Zang, B.4
-
20
-
-
1342324998
-
Discovering and exploiting program phases
-
IEEE nov.-dec.
-
T. Sherwood, E. Perelman, G. Hamerly, S. Sair, and B. Calder, "Discovering and exploiting program phases," Micro, IEEE, Vol. 23, pp. 84-93, nov.-dec. 2003.
-
(2003)
Micro
, vol.23
, pp. 84-93
-
-
Sherwood, T.1
Perelman, E.2
Hamerly, G.3
Sair, S.4
Calder, B.5
-
21
-
-
36949023020
-
Live, runtime phase monitoring and prediction on real systems with application too dynamic power management
-
C. Isci, G. Contreras, and M. Martonosi, "Live, runtime phase monitoring and prediction on real systems with application too dynamic power management," in Proc. of the 39th Annual IEEE/ACM Intl. Symp. on Microarchitecture, pp. 359-370, 2006.
-
(2006)
Proc. of the 39th Annual IEEE/ACM Intl. Symp. on Microarchitecture
, pp. 359-370
-
-
Isci, C.1
Contreras, G.2
Martonosi, M.3
-
22
-
-
84878368035
-
Dissecting android malware: Characterization and evolution
-
2012 IEEE Symp. on may
-
Y. Zhou and X. Jiang, "Dissecting android malware: Characterization and evolution," in Security and Privacy (SP), 2012 IEEE Symp. on, pp. 95-109, may 2012.
-
(2012)
Security and Privacy (SP)
, pp. 95-109
-
-
Zhou, Y.1
Jiang, X.2
-
24
-
-
84881126239
-
-
BlackHat Library Mar
-
BlackHat Library, "Jynx rootkit2.0," Mar 2012.
-
(2012)
Jynx Rootkit2.0
-
-
-
26
-
-
84864833517
-
Side-channel vulnerability factor: A metric for measuring information leakage
-
J. Demme, R. Martin, A. Waksman, and S. Sethumadhavan, "Side-Channel Vulnerability Factor: A Metric for Measuring Information Leakage," in The 39th Intl. Symp. on Computer Architecture, pp. 106-117, 2012.
-
(2012)
The 39th Intl. Symp. on Computer Architecture
, pp. 106-117
-
-
Demme, J.1
Martin, R.2
Waksman, A.3
Sethumadhavan, S.4
-
27
-
-
80755169488
-
Sice: A hardware-level strongly isolated computing environment for x86 multi-core platforms
-
(New York, NY, USA) ACM
-
A. M. Azab, P. Ning, and X. Zhang, "Sice: a hardware-level strongly isolated computing environment for x86 multi-core platforms," in Proc. of the 18th ACM conf. on Computer and communications security, (New York, NY, USA), pp. 375-388, ACM, 2011.
-
(2011)
Proc. of the 18th ACM Conf. on Computer and Communications Security
, pp. 375-388
-
-
Azab, A.M.1
Ning, P.2
Zhang, X.3
|