-
1
-
-
3242889975
-
Replacing suffix trees with enhanced suffix arrays
-
Abouelhoda, M.I., Kurtz, S., Ohlebusch, E.: Replacing suffix trees with enhanced suffix arrays. Journal of Discrete Algorithms 2(1) (2004)
-
(2004)
Journal of Discrete Algorithms
, vol.2
, Issue.1
-
-
Abouelhoda, M.I.1
Kurtz, S.2
Ohlebusch, E.3
-
3
-
-
38149089416
-
Automated classification and analysis of internet malware
-
Kruegel, C., Lippmann, R., Clark, A. (eds.) RAID 2007. Springer, Heidelberg
-
Bailey, M., Oberheide, J., Andersen, J., Mao, Z.M., Jahanian, F., Nazario, J.: Automated classification and analysis of internet malware. In: Kruegel, C., Lippmann, R., Clark, A. (eds.) RAID 2007. LNCS, vol. 4637, pp. 178-197. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4637
, pp. 178-197
-
-
Bailey, M.1
Oberheide, J.2
Andersen, J.3
Mao, Z.M.4
Jahanian, F.5
Nazario, J.6
-
4
-
-
85043201839
-
Scalable, behavior-based malware clustering
-
Bayer, U., Comparetti, P.M., Hlauschek, C., Kruegel, C., Kirda, E.: Scalable, behavior-based malware clustering. In: NDSS (2009)
-
NDSS (2009)
-
-
Bayer, U.1
Comparetti, P.M.2
Hlauschek, C.3
Kruegel, C.4
Kirda, E.5
-
5
-
-
85064176806
-
Measuring pay-per-install: The commoditization of malware distribution
-
Caballero, J., Grier, C., Kreibich, C., Paxson, V.: Measuring pay-per-install: The commoditization of malware distribution. In: Usenixsecurity (2011)
-
Usenixsecurity (2011)
-
-
Caballero, J.1
Grier, C.2
Kreibich, C.3
Paxson, V.4
-
6
-
-
85025141365
-
Binary code extraction and interface identification for security applications
-
Caballero, J., Johnson, N.M., McCamant, S., Song, D.: Binary code extraction and interface identification for security applications. In: NDSS (2010)
-
NDSS (2010)
-
-
Caballero, J.1
Johnson, N.M.2
McCamant, S.3
Song, D.4
-
7
-
-
77952403312
-
Polyglot: Automatic extraction of protocol message format using dynamic binary analysis
-
Caballero, J., Yin, H., Liang, Z., Song, D.: Polyglot: Automatic extraction of protocol message format using dynamic binary analysis. In: CCS (2007)
-
CCS (2007)
-
-
Caballero, J.1
Yin, H.2
Liang, Z.3
Song, D.4
-
8
-
-
0000301097
-
A greedy heuristic for the set-covering problem
-
Chvatal, V.: A greedy heuristic for the set-covering problem. Mathematics of Operations Research 4(3) (1979)
-
(1979)
Mathematics of Operations Research
, vol.4
, Issue.3
-
-
Chvatal, V.1
-
9
-
-
84888375785
-
-
Oakland
-
Cui, W., Peinado, M., Wang, H.J., Locasto, M.: shieldgen: Automatic data patch generation for unknown vulnerabilities with informed probing, Oakland (2007)
-
(2007)
Shieldgen: Automatic Data Patch Generation for Unknown Vulnerabilities with Informed Probing
-
-
Cui, W.1
Peinado, M.2
Wang, H.J.3
Locasto, M.4
-
10
-
-
85077692116
-
Dynamic application-layer protocol analysis for network intrusion detection
-
Dreger, H., Feldmann, A.,Mai, M., Paxson, V., Sommer, R.: Dynamic application-layer protocol analysis for network intrusion detection. In: Usenixsecurity (2006)
-
Usenixsecurity (2006)
-
-
Dreger, H.1
Feldmann, A.2
Mai, M.3
Paxson, V.4
Sommer, R.5
-
12
-
-
84869388520
-
Manufacturing compromise: The emergence of exploit-as-a-service
-
Grier, C., et al.:Manufacturing compromise: The emergence of exploit-as-a-service. In: CCS (2012)
-
CCS (2012)
-
-
Grier, C.1
-
13
-
-
85075837457
-
Botminer: Clustering analysis of network traffic for protocol and structure independent botnet detection
-
Gu, G., Perdisci, R., Zhang, J., Lee, W.: Botminer: Clustering analysis of network traffic for protocol and structure independent botnet detection. In: Usenixsecurity (2008)
-
Usenixsecurity (2008)
-
-
Gu, G.1
Perdisci, R.2
Zhang, J.3
Lee, W.4
-
14
-
-
56549090955
-
A study of the packer problem and its solutions
-
Lippmann, R., Kirda, E., Trachtenberg, A. (eds.) RAID 2008. Springer, Heidelberg
-
Guo, F., Ferrie, P., Chiueh, T.-C.: A study of the packer problem and its solutions. In: Lippmann, R., Kirda, E., Trachtenberg, A. (eds.) RAID 2008. LNCS, vol. 5230, pp. 98-115. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5230
, pp. 98-115
-
-
Guo, F.1
Ferrie, P.2
Chiueh, T.-C.3
-
15
-
-
29244451861
-
acas: Automated construction of application signatures
-
Haffner, P., Sen, S., Spatscheck, O., Wang, D.: acas: Automated construction of application signatures. In: Minenet (2005)
-
Minenet (2005)
-
-
Haffner, P.1
Sen, S.2
Spatscheck, O.3
Wang, D.4
-
16
-
-
80755168347
-
Bitshred: Feature hashing malware for scalable triage and semantic analysis
-
Jang, J., Brumley, D., Venkataraman, S.: Bitshred: Feature hashing malware for scalable triage and semantic analysis. In: CCS (2011)
-
CCS (2011)
-
-
Jang, J.1
Brumley, D.2
Venkataraman, S.3
-
17
-
-
85076932663
-
Studying spamming botnets using botlab
-
John, J.P., Moshchuk, A., Gribble, S.D., Krishnamurthy, A.: Studying spamming botnets using botlab. In: NSDI (2009)
-
NSDI (2009)
-
-
John, J.P.1
Moshchuk, A.2
Gribble, S.D.3
Krishnamurthy, A.4
-
18
-
-
85084163246
-
Autograph: Toward automated, distributed worm signature detection
-
Kim, H.-A., Karp, B.: Autograph: Toward automated, distributed worm signature detection. In: Usenixsecurity (2004)
-
Usenixsecurity (2004)
-
-
Kim, H.-A.1
Karp, B.2
-
19
-
-
85077680022
-
Behavior-based spyware detection
-
Kirda, E., Kruegel, C., Banks, G., Vigna, G., Kemmerer, R.A.: Behavior-based spyware detection. In: Usenixsecurity (2006)
-
Usenixsecurity (2006)
-
-
Kirda, E.1
Kruegel, C.2
Banks, G.3
Vigna, G.4
Kemmerer, R.A.5
-
20
-
-
33646048960
-
Honeycomb - creating intrusion detection signatures using honeypots
-
Kreibich, C., Crowcroft, J.: Honeycomb - creating intrusion detection signatures using honeypots. In: Hotnets (2003)
-
Hotnets (2003)
-
-
Kreibich, C.1
Crowcroft, J.2
-
21
-
-
82955197334
-
gq: Practical containment for measuring modern malware systems
-
Kreibich, C., Weaver, N., Kanich, C., Cui, W., Paxson, V.: gq: Practical containment for measuring modern malware systems. In: IMC (2011)
-
IMC (2011)
-
-
Kreibich, C.1
Weaver, N.2
Kanich, C.3
Cui, W.4
Paxson, V.5
-
22
-
-
84873437158
-
-
Oakland
-
Li, Z., Sanghi, M., Chavez, B., Chen, Y., Kao, M.-Y.: Hamsa: Fast signature generation for zero-day polymorphic worms with provable attack resilience, Oakland (2006)
-
(2006)
Hamsa: Fast Signature Generation for Zero-day Polymorphic Worms with Provable Attack Resilience
-
-
Li, Z.1
Sanghi, M.2
Chavez, B.3
Chen, Y.4
Kao, M.-Y.5
-
23
-
-
84888352929
-
-
The malicia project, http://malicia-project.com/.
-
-
-
-
24
-
-
84881183138
-
Driving in the cloud: An analysis of drive-by download operations and abuse reporting
-
Rieck, K., Stewin, P., Seifert, J.-P. (eds.) DIMVA 2013. Springer, Heidelberg
-
Nappa, A., Rafique, M.Z., Caballero, J.: Driving in the cloud: An analysis of drive-by download operations and abuse reporting. In: Rieck, K., Stewin, P., Seifert, J.-P. (eds.) DIMVA 2013. LNCS, vol. 7967, pp. 1-20. Springer, Heidelberg (2013)
-
(2013)
LNCS
, vol.7967
, pp. 1-20
-
-
Nappa, A.1
Rafique, M.Z.2
Caballero, J.3
-
26
-
-
85076751448
-
Behavioral clustering of http-based malware and signature generation using malicious network traces
-
Perdisci, R., Lee, W., Feamster, N.: Behavioral clustering of http-based malware and signature generation using malicious network traces. In: NSDI (2010)
-
NSDI (2010)
-
-
Perdisci, R.1
Lee, W.2
Feamster, N.3
-
27
-
-
84904093630
-
Towards a fully automated malware clustering validity analysis
-
Perdisci, R., Vamo, M.U.: Towards a fully automated malware clustering validity analysis. In: ACSAC (2012)
-
ACSAC (2012)
-
-
Perdisci, R.1
Vamo, M.U.2
-
28
-
-
49949090311
-
Learning and classification of malware behavior
-
Zamboni, D. (ed.) DIMVA 2008. Springer, Heidelberg
-
Rieck, K., Holz, T., Willems, C., Düssel, P., Laskov, P.: Learning and classification of malware behavior. In: Zamboni, D. (ed.) DIMVA 2008. LNCS, vol. 5137, pp. 108-125. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5137
, pp. 108-125
-
-
Rieck, K.1
Holz, T.2
Willems, C.3
Düssel, P.4
Laskov, P.5
-
29
-
-
77954740531
-
Botzilla: Detecting the phoning home of malicious software
-
Rieck, K., Schwenk, G., Limmer, T., Holz, T., Laskov, P.: Botzilla: Detecting the phoning home of malicious software. In: ACM Symposium on Applied Computing (2010)
-
ACM Symposium on Applied Computing (2010)
-
-
Rieck, K.1
Schwenk, G.2
Limmer, T.3
Holz, T.4
Laskov, P.5
-
30
-
-
84881159206
-
PRO VEX: Detecting botnets with encrypted command and control channels
-
Rieck, K., Stewin, P., Seifert, J.-P. (eds.) DIMVA 2013. Springer, Heidelberg
-
Rossow, C., Dietrich, C.J.: PRO VEX: Detecting botnets with encrypted command and control channels. In: Rieck, K., Stewin, P., Seifert, J.-P. (eds.) DIMVA 2013. LNCS, vol. 7967, pp. 21-40. Springer, Heidelberg (2013)
-
(2013)
LNCS
, vol.7967
, pp. 21-40
-
-
Rossow, C.1
Dietrich, C.J.2
-
31
-
-
79958728571
-
Sandnet: Network traffic analysis of malicious software
-
Rossow, C., Dietrich, C.J., Bos, H., Cavallaro, L., van Steen, M., Freiling, F.C., Pohlmann, N.: Sandnet: Network traffic analysis of malicious software. In: Badgers (2011)
-
Badgers (2011)
-
-
Rossow, C.1
Dietrich, C.J.2
Bos, H.3
Cavallaro, L.4
Van Steen, M.5
Freiling, F.C.6
Pohlmann, N.7
-
32
-
-
84991765629
-
Automatedwormfingerprinting
-
Singh, S.,Estan,C.,Varghese,G., Savage, S.:Automatedwormfingerprinting. In:Osdi (2004)
-
Osdi (2004)
-
-
Singh, S.1
Estan, C.2
Varghese, G.3
Savage, S.4
-
33
-
-
84888369468
-
-
Snort, http://www.snort.org/.
-
-
-
-
34
-
-
84888355887
-
-
Suricata, http://suricata-ids.org/.
-
-
-
-
35
-
-
8344251916
-
Deterministic memory-efficient string matching algorithms for intrusion detection
-
Tuck, N., Sherwood, T., Calder, B., Varghese, G.: Deterministic memory-efficient string matching algorithms for intrusion detection. In: Infocom (2004)
-
Infocom (2004)
-
-
Tuck, N.1
Sherwood, T.2
Calder, B.3
Varghese, G.4
-
36
-
-
84885575254
-
Scalability, fidelity, and containment in the potemkin virtual honeyfarm
-
Vrable, M., Ma, J.,Chen, J., Moore, D.,Vandekieft, E., Snoeren,A.C.,Voelker, G.M., Savage, S.: Scalability, fidelity, and containment in the potemkin virtual honeyfarm. In: SOSP (2005)
-
SOSP (2005)
-
-
Vrable, M.1
Ma, J.2
Chen, J.3
Moore, D.4
Vandekieft, E.5
Snoeren, A.C.6
Voelker, G.M.7
Savage, S.8
-
37
-
-
33745641552
-
Anomalous payload-based worm detection and signature generation
-
Valdes, A., Zamboni, D. (eds.) RAID 2005. Springer, Heidelberg
-
Wang, K., Cretu, G.F., Stolfo, S.J.: Anomalous payload-based worm detection and signature generation. In: Valdes, A., Zamboni, D. (eds.) RAID 2005. LNCS, vol. 3858, pp. 227-246. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.3858
, pp. 227-246
-
-
Wang, K.1
Cretu, G.F.2
Stolfo, S.J.3
-
38
-
-
70350374367
-
Automatically generating models for botnet detection
-
Backes, M., Ning, P. (eds.) ESORICS 2009. Springer, Heidelberg
-
Wurzinger, P., Bilge, L., Holz, T., Goebel, J., Kruegel, C., Kirda, E.: Automatically generating models for botnet detection. In: Backes, M., Ning, P. (eds.) ESORICS 2009. LNCS, vol. 5789, pp. 232-249. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5789
, pp. 232-249
-
-
Wurzinger, P.1
Bilge, L.2
Holz, T.3
Goebel, J.4
Kruegel, C.5
Kirda, E.6
-
39
-
-
84881159288
-
-
Wyke, J.: The zeroaccess botnet (2012), http://www.sophos.com/en-us/why- sophos/our-people/technical-papers/zeroaccess-botnet.aspx
-
(2012)
The Zeroaccess Botnet
-
-
Wyke, J.1
-
40
-
-
58449122201
-
Spamming botnets: Signatures and characteristics
-
Xie, Y., Yu, F., Achan, K., Panigrahy, R., Hulten, G., Osipkov, I.: Spamming botnets: Signatures and characteristics. In: Sigcomm (2008)
-
Sigcomm (2008)
-
-
Xie, Y.1
Yu, F.2
Achan, K.3
Panigrahy, R.4
Hulten, G.5
Osipkov, I.6
-
41
-
-
84923445084
-
An architecture for generating semanticsaware signatures
-
Yegneswaran, V., Giffin, J.T., Barford, P., Jha, S.: An architecture for generating semanticsaware signatures. In: Usenixsecurity (2005)
-
Usenixsecurity (2005)
-
-
Yegneswaran, V.1
Giffin, J.T.2
Barford, P.3
Jha, S.4
-
42
-
-
77950788046
-
Panorama: Capturing system-wide information flow for malware detection and analysis
-
Yin, H., Song, D., Manuel, E., Kruegel, C., Kirda, E.: Panorama: Capturing system-wide information flow for malware detection and analysis. In: CCS (2007)
-
CCS (2007)
-
-
Yin, H.1
Song, D.2
Manuel, E.3
Kruegel, C.4
Kirda, E.5
|