-
2
-
-
84872113696
-
Efficient detection of split personalities in malware
-
D. Balzarotti, M. Cova, C. Karlberger, E. Kirda, C. Kruegel, and G. Vigna. Efficient Detection of Split Personalities in Malware. In Symp. Network & Distributed System Security (NDSS), 2010.
-
(2010)
Symp. Network & Distributed System Security (NDSS)
-
-
Balzarotti, D.1
Cova, M.2
Karlberger, C.3
Kirda, E.4
Kruegel, C.5
Vigna, G.6
-
6
-
-
42149142497
-
Challenging complexity of maximum common subgraph detection algorithms: A performance analysis of three algorithms on a wide database of graphs
-
D. Conte, P. Foggia, and M. Vento. Challenging complexity of maximum common subgraph detection algorithms: A performance analysis of three algorithms on a wide database of graphs. Journal of Graph Algorithms & Applications, 11(1), 2007.
-
(2007)
Journal of Graph Algorithms & Applications
, vol.11
, Issue.1
-
-
Conte, D.1
Foggia, P.2
Vento, M.3
-
7
-
-
84888402098
-
The zombie roundup: Understanding, detecting, and disrupting botnets
-
E. Cooke, F. Jahanian, and D. McPherson. The Zombie Roundup: Understanding, Detecting, and Disrupting Botnets. In USENIX Workshop Steps to Reducing Unwanted Traffic on the Internet Workshop (SRUTI), 2005.
-
(2005)
USENIX Workshop Steps to Reducing Unwanted Traffic on the Internet Workshop (SRUTI)
-
-
Cooke, E.1
Jahanian, F.2
McPherson, D.3
-
10
-
-
34547359214
-
Evading network anomaly detection systems: Formal reasoning and practical techniques
-
P. Fogla and W. Lee. Evading Network Anomaly Detection Systems: Formal Reasoning and Practical Techniques. In ACM Conf. Computer & Communications Security (CCS), 2006.
-
(2006)
ACM Conf. Computer & Communications Security (CCS)
-
-
Fogla, P.1
Lee, W.2
-
11
-
-
85077703150
-
Polymorphic blending attacks
-
P. Fogla, M. I. Sharif, R. Perdisci, O. Kolesnikov, and W. Lee. Polymorphic Blending Attacks. In Usenix Security Symp., 2006.
-
(2006)
Usenix Security Symp.
-
-
Fogla, P.1
Sharif, M.I.2
Perdisci, R.3
Kolesnikov, O.4
Lee, W.5
-
13
-
-
77955210614
-
Synthesizing near-optimal malware specifications from suspicious behaviors
-
M. Fredrikson, S. Jha, M. Christodorescu, R. Sailer, and X. Yan. Synthesizing near-optimal malware specifications from suspicious behaviors. In IEEE Symp. Security & Privacy, 2010.
-
(2010)
IEEE Symp. Security & Privacy
-
-
Fredrikson, M.1
Jha, S.2
Christodorescu, M.3
Sailer, R.4
Yan, X.5
-
16
-
-
85075837457
-
Botminer: Clustering analysis of network traffic for protocol- And structure-independent botnet detection
-
G. Gu, R. Perdisci, J. Zhang, and W. Lee. BotMiner: Clustering Analysis of Network Traffic for Protocol- and Structure-Independent Botnet Detection. In USENIX Security Symp., 2008.
-
(2008)
USENIX Security Symp.
-
-
Gu, G.1
Perdisci, R.2
Zhang, J.3
Lee, W.4
-
17
-
-
45749156009
-
Bothunter: Detecting malware infection through ids-driven dialog correlation
-
G. Gu, P. Porras, V. Yegneswaran, M. Fong, and W. Lee. BotHunter: Detecting Malware Infection Through IDS-Driven Dialog Correlation. In USENIX Security Symp., 2006.
-
(2006)
USENIX Security Symp.
-
-
Gu, G.1
Porras, P.2
Yegneswaran, V.3
Fong, M.4
Lee, W.5
-
19
-
-
85084097128
-
Measurements and mitigation of peer-to-peer-based botnets: A case study on storm worm
-
T. Holz, M. Steiner, F. Dahl, E. Biersack, and F. C. Freiling. Measurements and Mitigation of Peer-to-Peer-based Botnets: A Case Study on Storm Worm. In Usenix Workshop Large-Scale Exploits & Emergent Threats (LEET), 2008.
-
(2008)
Usenix Workshop Large-Scale Exploits & Emergent Threats (LEET)
-
-
Holz, T.1
Steiner, M.2
Dahl, F.3
Biersack, E.4
Freiling, F.C.5
-
20
-
-
85076497432
-
-
International Secure Systems Lab
-
International Secure Systems Lab. Anubis: Analyzing Unknown Binaries. http://anubis.iseclab.org, 2011.
-
(2011)
Anubis: Analyzing Unknown Binaries
-
-
-
21
-
-
70349995569
-
Functional polymorphic engines: Formalisation, implementation and use cases
-
G. Jacob, E. Filiol, and H. Debar. Functional polymorphic engines: Formalisation, implementation and use cases. Journal in Computer Virology, 5(3):247-261, 2009.
-
(2009)
Journal in Computer Virology
, vol.5
, Issue.3
, pp. 247-261
-
-
Jacob, G.1
Filiol, E.2
Debar, H.3
-
24
-
-
0038163983
-
-
Technical Report 02-017, University of Minnesota
-
G. Karypis. CLUTO - A Clustering Toolkit. Technical Report 02-017, University of Minnesota, 2003.
-
(2003)
CLUTO - A Clustering Toolkit
-
-
Karypis, G.1
-
25
-
-
85084163246
-
Autograph: Toward automated, distributed worm signature detection
-
H.-A. Kim and B. Karp. Autograph: Toward Automated, Distributed Worm Signature Detection. In USENIX Security Symp., 2004.
-
(2004)
USENIX Security Symp
-
-
Kim, H.-A.1
Karp, B.2
-
26
-
-
85076206522
-
Effective and efficient malware detection at the end host
-
C. Kolbitsch, P. Milani Comparetti, C. Kruegel, E. Kirda, X. Zhou, and X. Wang. Effective and Efficient Malware Detection at the End Host. In USENIX Security Symp., 2009.
-
(2009)
USENIX Security Symp.
-
-
Kolbitsch, C.1
Milani Comparetti, P.2
Kruegel, C.3
Kirda, E.4
Zhou, X.5
Wang, X.6
-
29
-
-
33751064824
-
Hamsa: Fast signature generation for zero-day polymorphic worms with provable attack resilience
-
Z. Li, M. Sanghi, Y. Chen, M.-Y. Kao, and B. Chavez. Hamsa: Fast Signature Generation for Zero-day PolymorphicWorms with Provable Attack Resilience. In IEEE Symp. Security & Privacy, 2006.
-
(2006)
IEEE Symp. Security & Privacy
-
-
Li, Z.1
Sanghi, M.2
Chen, Y.3
Kao, M.-Y.4
Chavez, B.5
-
31
-
-
27544498978
-
Polygraph: Automatically generating signatures for polymorphic worms
-
J. Newsom, B. Karp, and D. Song. Polygraph: Automatically Generating Signatures for Polymorphic Worms. In IEEE Symp. Security & Privacy, 2005.
-
(2005)
IEEE Symp. Security & Privacy
-
-
Newsom, J.1
Karp, B.2
Song, D.3
-
32
-
-
34249057779
-
Analysis of computer intrusions using sequences of function calls
-
S. Peisert, M. Bishop, S. Karin, and K. Marzullo. Analysis of Computer Intrusions Using Sequences of Function Calls. IEEE Trans. Dependable Secur. Comput., 4(2), 2007.
-
(2007)
IEEE Trans. Dependable Secur. Comput.
, vol.4
, Issue.2
-
-
Peisert, S.1
Bishop, M.2
Karin, S.3
Marzullo, K.4
-
33
-
-
33751051489
-
Misleading worm signature generators using deliberate noise injection
-
R. Perdisci, D. Dagon, W. Lee, P. Fogla, and M. I. Sharif. Misleading worm signature generators using deliberate noise injection. In IEEE Symp. Security & Privacy, 2006.
-
(2006)
IEEE Symp. Security & Privacy
-
-
Perdisci, R.1
Dagon, D.2
Lee, W.3
Fogla, P.4
Sharif, M.I.5
-
38
-
-
77955182005
-
All you ever wanted to know about dynamic taint analysis and forward symbolic execution (but might have been afraid to ask)
-
E. J. Schwartz, T. Avgerinos, and D. Brumley. All You Ever Wanted to Know about Dynamic Taint Analysis and Forward Symbolic Execution (but Might Have Been Afraid to Ask). In IEEE Symp. Security & Privacy, 2010.
-
(2010)
IEEE Symp. Security & Privacy
-
-
Schwartz, E.J.1
Avgerinos, T.2
Brumley, D.3
-
40
-
-
70449684394
-
Bitblaze: A new approach to computer security via binary analysis
-
D. Song, D. Brumley, H. Yin, J. Caballero, I. Jager, M. G. Kang, Z. Liang, J. Newsome, P. Poosankam, and P. Saxena. BitBlaze: A New Approach to Computer Security via Binary Analysis. In Int. Conf. Information Systems Security (ICISS), 2008.
-
(2008)
Int. Conf. Information Systems Security (ICISS)
-
-
Song, D.1
Brumley, D.2
Yin, H.3
Caballero, J.4
Jager, I.5
Kang, M.G.6
Liang, Z.7
Newsome, J.8
Poosankam, P.9
Saxena, P.10
-
45
-
-
78650896043
-
Automatically generating models for botnet detection
-
P. Wurzinger, L. Bilge, T. Holz, J. Göbel, C. Kruegel, and E. Kirda. Automatically generating models for botnet detection. In European Symp. Research in Computer Security (ESORICS), 2009.
-
(2009)
European Symp. Research in Computer Security (ESORICS)
-
-
Wurzinger, P.1
Bilge, L.2
Holz, T.3
Göbel, J.4
Kruegel, C.5
Kirda, E.6
|