-
1
-
-
84901759814
-
Current Status of the CARO Malware Naming Scheme
-
n.d., [Online], Available, 15 Sept.
-
Bontchev, V. (n.d.) Current Status of the CARO Malware Naming Scheme, [Online], Available:http://www.people.frisk-software.com/~bontchev/papers/pdfs/caroname.pdf, [15 Sept. 2009].
-
(2009)
-
-
Bontchev, V.1
-
2
-
-
84924223669
-
Static Analysis of Executables to Detect Malicious Patterns
-
4-8 Aug., Washington, DC, USA
-
Christodorescu, M. and Jha, S. (2003), 'Static Analysis of Executables to Detect Malicious Patterns', Proceedings of the 12th USENIX Security Symposium, 4-8 Aug., Washington, DC, USA, pp. 169-186.
-
(2003)
Proceedings of the 12th USENIX Security Symposium
, pp. 169-186
-
-
Christodorescu, M.1
Jha, S.2
-
3
-
-
23744485744
-
Testing Malware Detectors
-
11-14 July, Boston, MA, USA
-
Christodorescu, M. and Jha, S. (2004), 'Testing Malware Detectors', ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA 04), 11-14 July, Boston, MA, USA.
-
(2004)
ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA 04)
-
-
Christodorescu, M.1
Jha, S.2
-
4
-
-
27544433210
-
Semantics-Aware Malware Detection
-
May, Oakland, CA, USA
-
Christodorescu, M., Jha, S, Seshia, S., Song, D., Bryant, R. (2005), 'Semantics-Aware Malware Detection', IEEE Symposium on Security and Privacy, May, Oakland, CA, USA, pp. 32-46.
-
(2005)
IEEE Symposium on Security and Privacy
, pp. 32-46
-
-
Christodorescu, M.1
Jha, S.2
Seshia, S.3
Song, D.4
Bryant, R.5
-
5
-
-
84866655092
-
String Analysis for x86 Binaries
-
September, Lisbon, Portugal
-
Christodorescu, M., Kidd, N., Goh, W.H. (2005), 'String Analysis for x86 Binaries', 6th ACM SIGPLAN-SIGSOFT Workshop on Program Analysis for Software Tools and Engineerin, September, Lisbon, Portugal, pp. 88-95.
-
(2005)
6th ACM SIGPLAN-SIGSOFT Workshop on Program Analysis for Software Tools and Engineerin
, pp. 88-95
-
-
Christodorescu, M.1
Kidd, N.2
Goh, W.H.3
-
6
-
-
0004046658
-
A Taxonomy of Obfuscating Transformations
-
Department of Computer Science, University of Auckland, New Zealand
-
Collberg, C., Thomborson, C., Low, D. (1997), 'A Taxonomy of Obfuscating Transformations', Department of Computer Science, University of Auckland, New Zealand.
-
(1997)
-
-
Collberg, C.1
Thomborson, C.2
Low, D.3
-
7
-
-
84893032638
-
Spear phishers angling to steal your financial info
-
Federal Bureau of Investigation, [Online], Available, 1 Apr. [22 Oct. 2009]
-
Federal Bureau of Investigation (2009), Spear phishers angling to steal your financial info, [Online], Available:http://www.fbi.gov/page2/april09/spearphishin_040109.html, 1 Apr. [22 Oct. 2009].
-
(2009)
-
-
-
8
-
-
9444260263
-
The Application of CMAC Based Intelligent Agents in the Detection of Previously Unseen Computer Viruses
-
Bethesda, MD, USA
-
Luke, J., Harris, C.J. (1999), The Application of CMAC Based Intelligent Agents in the Detection of Previously Unseen Computer Viruses, Proceedings of the 1999 International Conference on Information Intelligence and Systems, Bethesda, MD, USA, pp. 662-6.
-
(1999)
Proceedings of the 1999 International Conference on Information Intelligence and Systems
, pp. 662-666
-
-
Luke, J.1
Harris, C.J.2
-
9
-
-
85163489985
-
Nasty banking Trojan heralds new wave of smarter crimeware
-
[Online], Available, 6 Oct. [21 Oct 2009]
-
McMillan, R. (2009) Nasty banking Trojan heralds new wave of smarter crimeware, [Online], Available:http://www.infoworld.com/d/security-central/nasty-banking-trojan-heralds-new-wave-smarter-crimeware-625, 6 Oct. [21 Oct 2009].
-
(2009)
-
-
McMillan, R.1
-
10
-
-
85163430607
-
W32.Wargbot
-
[Online], Available, 13 Feb. [15 Sept. 2009]
-
Nakayama, T. (2007) W32.Wargbot, [Online], Available:http://www.symantec.com/business/securit_response/writeup.jsp?docid=2006-081312-3302-99, 13 Feb. [15 Sept. 2009].
-
(2007)
-
-
Nakayama, T.1
-
11
-
-
21644475665
-
Static Analyzer of Vicious Executables (SAVE)
-
Tucson, AZ, USA
-
Sung, A., Xu, J., Chavez, P., Mukkamala, S. (2004), 'Static Analyzer of Vicious Executables (SAVE)', Proceedings of 20th Annual Computer Security Applications Conference, Tucson, AZ, USA, pp. 326-334.
-
(2004)
Proceedings of 20th Annual Computer Security Applications Conference
, pp. 326-334
-
-
Sung, A.1
Xu, J.2
Chavez, P.3
Mukkamala, S.4
-
12
-
-
85163451510
-
VX Heavens Malware Database
-
n.d., [Online], Available, 28 Nov
-
VX Heavens (n.d.) VX Heavens Malware Database, [Online], Available:http://vx.netlux.org.googlepages.com/VXHeavensVirusCollection.html, [28 Nov. 2008].
-
(2008)
-
-
Heavens, V.X.1
-
13
-
-
28344446955
-
Polymorphic Malicious Executable Scanner by API Sequence Analysis
-
Kitakyushu, Japan
-
Xu, J., Sung, A., Chavez, P., Mukkamala, S. (2004), 'Polymorphic Malicious Executable Scanner by API Sequence Analysis', Fourth International Conference on Hybrid Intelligent Systems, Kitakyushu, Japan, pp. 378-383.
-
(2004)
Fourth International Conference on Hybrid Intelligent Systems
, pp. 378-383
-
-
Xu, J.1
Sung, A.2
Chavez, P.3
Mukkamala, S.4
|