-
1
-
-
33745788388
-
Model checking x86 executables with codesurfer/x86 and wpds++
-
G. Balakrishnan, T. W. Reps, N. Kidd, A. Lal, J. Lim, D. Melski, R. Gruian, S. H. Yong, C.-H. Chen, and T. Teitelbaum. Model checking x86 executables with codesurfer/x86 and wpds++. In CAV, 2005.
-
(2005)
CAV
-
-
Balakrishnan, G.1
Reps, T.W.2
Kidd, N.3
Lal, A.4
Lim, J.5
Melski, D.6
Gruian, R.7
Yong, S.H.8
Chen, C.-H.9
Teitelbaum, T.10
-
2
-
-
0036039066
-
The SLAM project: Debugging system software via static analysis
-
T. Ball and S. K. Rajamani. The SLAM project: debugging system software via static analysis. In POPL, 2002.
-
(2002)
POPL
-
-
Ball, T.1
Rajamani, S.K.2
-
3
-
-
78650082281
-
Behavior abstraction in malware analysis
-
P. Beaucamps, I. Gnaedig, and J.-Y. Marion. Behavior abstraction in malware analysis. In RV, pages 168-182, 2010.
-
(2010)
RV
, pp. 168-182
-
-
Beaucamps, P.1
Gnaedig, I.2
Marion, J.-Y.3
-
4
-
-
84865600110
-
Abstraction-based malware analysis using rewriting and model checking
-
P. Beaucamps, I. Gnaedig, and J.-Y. Marion. Abstraction-based malware analysis using rewriting and model checking. In ESORICS, pages 806-823, 2012.
-
(2012)
ESORICS
, pp. 806-823
-
-
Beaucamps, P.1
Gnaedig, I.2
Marion, J.-Y.3
-
5
-
-
34247166239
-
Static detection of Malicious code in executable programs
-
J. Bergeron, M. Debbabi, J. Desharnais, M. Erhioui, Y. Lavoie, and N. Tawbi. Static detection of malicious code in executable programs. In SREIS, 2001.
-
(2001)
SREIS
-
-
Bergeron, J.1
Debbabi, M.2
Desharnais, J.3
Erhioui, M.4
Lavoie, Y.5
Tawbi, N.6
-
6
-
-
35348951470
-
The software model checker blast
-
D. Beyer, T. A. Henzinger, R. Jhala, and R. Majumdar. The software model checker blast. STTT, 9(5-6):505-525, 2007.
-
(2007)
STTT
, vol.9
, Issue.5-6
, pp. 505-525
-
-
Beyer, D.1
Henzinger, T.A.2
Jhala, R.3
Majumdar, R.4
-
7
-
-
77954996346
-
Automatically identifying trigger-based behavior in malware
-
D. Brumley, C. Hartwig, Z. Liang, J. Newsome, D. X. Song, and H. Yin. Automatically identifying trigger-based behavior in malware. In Botnet Detection. 2008.
-
(2008)
Botnet Detection
-
-
Brumley, D.1
Hartwig, C.2
Liang, Z.3
Newsome, J.4
Song, D.X.5
Yin, H.6
-
8
-
-
35348856143
-
Detecting self-mutating malware using control-flow graph matching
-
D. Bruschi, L. Martignoni, and M. Monga. Detecting self-mutating malware using control-flow graph matching. In DIMVA, 2006.
-
(2006)
DIMVA
-
-
Bruschi, D.1
Martignoni, L.2
Monga, M.3
-
10
-
-
27544433210
-
Semantics-aware malware detection
-
M. Christodorescu, S. Jha, S. A. Seshia, D. X. Song, and R. E. Bryant. Semantics-aware malware detection. In IEEE Symposium on Security and Privacy, 2005.
-
(2005)
IEEE Symposium on Security and Privacy
-
-
Christodorescu, M.1
Jha, S.2
Seshia, S.A.3
Song, D.X.4
Bryant, R.E.5
-
11
-
-
84903607772
-
Dynamic spyware analysis
-
M. Egele, C. Kruegel, E. Kirda, H. Yin, and D. X. Song. Dynamic spyware analysis. In USENIX Annual Technical Conference, 2007.
-
(2007)
USENIX Annual Technical Conference
-
-
Egele, M.1
Kruegel, C.2
Kirda, E.3
Yin, H.4
Song, D.X.5
-
12
-
-
84883676933
-
-
Hex-Rays
-
Hex-Rays. IDAPro, 2011.
-
(2011)
IDAPro
-
-
-
13
-
-
84883724543
-
Using verification technology to specify and detect malware
-
A. Holzer, J. Kinder, and H. Veith. Using verification technology to specify and detect malware. In EUROCAST, 2007.
-
(2007)
EUROCAST
-
-
Holzer, A.1
Kinder, J.2
Veith, H.3
-
15
-
-
78149427876
-
Jakstab: A static analysis platform for binaries
-
J. Kinder and H. Veith. Jakstab: A static analysis platform for binaries. In CAV, 2008.
-
(2008)
CAV
-
-
Kinder, J.1
Veith, H.2
-
16
-
-
33751120104
-
A method for detecting obfuscated calls in Malicious binaries
-
A. Lakhotia, E. U. Kumar, and M. Venable. A method for detecting obfuscated calls in malicious binaries. IEEE Trans. Software Eng., 31(11), 2005.
-
(2005)
IEEE Trans. Software Eng.
, vol.31
, Issue.11
-
-
Lakhotia, A.1
Kumar, E.U.2
Venable, M.3
-
17
-
-
84883701765
-
-
PEfile. http://code.google.com/p/pefile, 2012.
-
(2012)
PEfile
-
-
-
18
-
-
84946414079
-
Static verification of worm and virus behavior in binary executables using model checking
-
P. K. Singh and A. Lakhotia. Static verification of worm and virus behavior in binary executables using model checking. In IAW, 2003.
-
(2003)
IAW
-
-
Singh, P.K.1
Lakhotia, A.2
-
19
-
-
84865960221
-
Efficient malware detection using model-checking
-
F. Song and T. Touili. Efficient malware detection using model-checking. In FM, 2012.
-
(2012)
FM
-
-
Song, F.1
Touili, T.2
-
20
-
-
84866938634
-
PuMoC: A CTL model-checker for sequential programs
-
F. Song and T. Touili. PuMoC: A CTL Model-Checker for Sequential Programs. In ASE, 2012.
-
(2012)
ASE
-
-
Song, F.1
Touili, T.2
-
21
-
-
84880088670
-
Pushdown model checking for malware detection
-
F. Song and T. Touili. Pushdown model checking for malware detection. In TACAS, 2012.
-
(2012)
TACAS
-
-
Song, F.1
Touili, T.2
-
22
-
-
84880088670
-
LTL model-checking for malware detection
-
F. Song and T. Touili. LTL Model-Checking for Malware Detection. TACAS, 2013.
-
(2013)
TACAS
-
-
Song, F.1
Touili, T.2
-
23
-
-
77954983679
-
Directed proof generation for machine code
-
A. V. Thakur, J. Lim, A. Lal, A. Burton, E. Driscoll, M. Elder, T. Andersen, and T. W. Reps. Directed proof generation for machine code. In CAV, pages 288-305, 2010.
-
(2010)
CAV
, pp. 288-305
-
-
Thakur, A.V.1
Lim, J.2
Lal, A.3
Burton, A.4
Driscoll, E.5
Elder, M.6
Andersen, T.7
Reps, T.W.8
|