-
1
-
-
77955210614
-
Synthesizing near-optimal malware specifications from suspicious behaviors
-
Privacy, Berkeley, CA, USA, Apr.
-
M. Fredrikson, S. Jha, M. Christodorescu, R. Sailer, and X. Yan, "Synthesizing near-optimal malware specifications from suspicious behaviors," in Proc. IEEE Symp. Sec. Privacy, Berkeley, CA, USA, Apr. 2010, pp. 45-60.
-
(2010)
Proc. IEEE Symp. Sec.
, pp. 45-60
-
-
Fredrikson, M.1
Jha, S.2
Christodorescu, M.3
Sailer, R.4
Yan, X.5
-
2
-
-
78650024495
-
AccessMiner: Using system-centric models for malware protection
-
Chicago, IL, USA, Oct.
-
A. Lanzi, D. Balzarotti, C. Kruegel, M. Christodorescu, and E. Kirda, "AccessMiner: Using system-centric models for malware protection," in Proc. 17th ACM CCS, Chicago, IL, USA, Oct. 2010, pp. 399-412.
-
(2010)
Proc. 17th ACM CCS
, pp. 399-412
-
-
Lanzi, A.1
Balzarotti, D.2
Kruegel, C.3
Christodorescu, M.4
Kirda, E.5
-
3
-
-
0029716418
-
A sense of self for Unix processes
-
Oakland, CA, USA, May
-
S. Forrest, S. A. Hofmeyr, A. Somayaji, and T. A. Longstaff, "A sense of self for Unix processes," in Proc. IEEE Symp. Sec. Privacy, Oakland, CA, USA, May 1996, pp. 120-128.
-
(1996)
Proc. IEEE Symp. Sec. Privacy
, pp. 120-128
-
-
Forrest, S.1
Hofmeyr, S.A.2
Somayaji, A.3
Longstaff, T.A.4
-
6
-
-
84893343626
-
-
Dec. 10 [Online]. Available
-
(2013, Dec. 10). Microsoft Security Bulletins [Online]. Available: http://www.microsoft.com/technet/security/current.aspx
-
(2013)
Microsoft Security Bulletins
-
-
-
7
-
-
84893345225
-
-
Symantec Inc., Mountain View, CA USA. (2012 Aug.) [Online].Available
-
Symantec, Inc., Mountain View, CA, USA. (2012, Aug.). Threats List [Online]. Available: http://www.symantec.com/business/security-response/ threatexplorer/threats.jsp
-
Threats List
-
-
-
8
-
-
79960164190
-
Gatekeeper: Monitoring auto-start extensibility points (ASEPs) for spyware management
-
Nov.
-
Y.-M. Wang, R. Roussev, C. Verbowski, A. Johnson, M.-W. Wu, Y. Huang, et al., "Gatekeeper: Monitoring auto-start extensibility points (ASEPs) for spyware management," in Proc. 18th LISA Syst. Admin. Conf., vol. 4. Nov. 2004, pp. 33-46.
-
(2004)
Proc. 18th LISA Syst. Admin. Conf.
, vol.4
, pp. 33-46
-
-
Wang, Y.-M.1
Roussev, R.2
Verbowski, C.3
Johnson, A.4
Wu, M.-W.5
Huang, Y.6
-
9
-
-
84882800335
-
Simple, state based approaches to program-based anomaly detection
-
Aug.
-
C. C. Michael and A. Ghosh, "Simple, state based approaches to program-based anomaly detection," ACM Trans. Inf. Syst. Sec., vol. 5, no. 3, pp. 203-237, Aug. 2002.
-
(2002)
ACM Trans. Inf. Syst. Sec.
, vol.5
, Issue.3
, pp. 203-237
-
-
Michael, C.C.1
Ghosh, A.2
-
10
-
-
21644490164
-
Backtracking intrusions
-
SOSP'03: Proceedings of the 19th ACM Symposium on Operating Systems Principles
-
S. T. King and P. M. Chen, "Backtracking intrusions," in Proc. ACM Symp. Oper. Syst. Principles, 2003, pp. 223-236. (Pubitemid 40929699)
-
(2003)
Operating Systems Review (ACM)
, vol.37
, Issue.5
, pp. 223-236
-
-
King, S.T.1
Chen, P.M.2
-
11
-
-
28344446955
-
Polymorphic malicious executable scanner by API sequence analysis
-
Proceedings - HIS'04: 4th International Conference on Hybrid Intelligent Systems
-
J. Xu, A. H. Sung, P. Chavez, and S. Mukkamala, "Polymorphic malicious executable scanner by API sequence analysis," in Proc. 4th Int. Conf. HIS, Dec. 2004, pp. 378-383. (Pubitemid 41718815)
-
(2005)
Proceedings - HIS'04: 4th International Conference on Hybrid Intelligent Systems
, pp. 378-383
-
-
Xu, J.-Y.1
Sung, A.H.2
Chavez, P.3
Mukkamala, S.4
-
12
-
-
0032313923
-
Intrusion detection using sequences of system calls
-
Jan.
-
S. A. Hofmeyr, S. Forrest, and A. Somayaji, "Intrusion detection using sequences of system calls," J. Comput. Sec., vol. 6, no. 3, pp. 151-180, Jan. 1998.
-
(1998)
J. Comput. Sec.
, vol.6
, Issue.3
, pp. 151-180
-
-
Hofmeyr, S.A.1
Forrest, S.2
Somayaji, A.3
-
13
-
-
85084163349
-
Data mining approaches for intrusion detection
-
W. Lee and S. J. Stolfo, "Data mining approaches for intrusion detection," in Proc. 7th USENIX Sec. Symp., vol. 7. 1998, pp. 1-6.
-
(1998)
Proc. 7th USENIX Sec. Symp.
, vol.7
, pp. 1-6
-
-
Lee, W.1
Stolfo, S.J.2
-
14
-
-
21644475665
-
Static Analyzer of Vicious Executables (SAVE)
-
Proceedings - 20th Annual Computer Security Applications Conference, ACSAC 2004
-
S. Mukkamala, A. Sung, D. Xu, and P. Chavez, "Static analyzer for vicious executables (SAVE)," in Proc. 20th ACSAC, 2004, pp. 326-334. (Pubitemid 40931087)
-
(2004)
Proceedings - Annual Computer Security Applications Conference, ACSAC
, pp. 326-334
-
-
Sung, A.H.1
Xu, J.2
Chavez, P.3
Mukkamala, S.4
-
15
-
-
33745463455
-
Learning classifiers for isuse and anomaly detection using a bag of system calls representation
-
IAW, Jan.
-
D. Kang, D. Fuller, and V. Honavar, "Learning classifiers for isuse and anomaly detection using a bag of system calls representation," in Proc. 6th IEEE Syst. Man Cybern. IAW, Jan. 2005, pp. 1-8.
-
(2005)
Proc. 6th IEEE Syst. Man Cybern
, pp. 1-8
-
-
Kang, D.1
Fuller, D.2
Honavar, V.3
-
17
-
-
84885588230
-
The Taser intrusion recovery system
-
DOI 10.1145/1095809.1095826
-
K. Farhadi, Z. Li, A. Goel, K. Po, and E. Lara, "The taser intrusion recovery system," in Proc. 20th ACM SOSP, Dec. 2005, pp. 163-176. (Pubitemid 44892211)
-
(2005)
Operating Systems Review (ACM)
, vol.39
, Issue.5
, pp. 163-176
-
-
Goel, A.1
Po, K.2
Farhadi, K.3
Zheng, L.4
De Lara, E.5
-
18
-
-
84893425040
-
Design, implementation, and evaluation of repairable file service
-
N. Zhu and T. Chiueh. "Design, implementation, and evaluation of repairable file service," in Proc. 21st ICDE, 2003, pp. 1024-1035.
-
(2003)
Proc. 21st ICDE
, pp. 1024-1035
-
-
Zhu, N.1
Chiueh, T.2
-
19
-
-
84893398954
-
-
Nov. 13 [Online]. Available
-
(2013, Nov. 13). Offensive Computing [Online]. Available: http://www.offensivecomputing.net/
-
(2013)
Offensive Computing
-
-
-
20
-
-
79960187763
-
Safe side effects commitment for OS-level virtualization
-
Z. Shan, X. Wang, T. Chiueh, and X. Meng, "Safe side effects commitment for OS-level virtualization," in Proc. 8th ACM Int. Conf. Auto. Comput., 2011, pp. 111-120.
-
(2011)
Proc. 8th ACM Int. Conf. Auto. Comput.
, pp. 111-120
-
-
Shan, Z.1
Wang, X.2
Chiueh, T.3
Meng, X.4
-
21
-
-
14844297052
-
Gray-box extraction of execution graphs for anomaly detection
-
Proceedings of the 11th ACM Conference on Computer and Communications Security, CCS 2004
-
D. Gao, M. K. Reiter, and D. Song, "Gray-box extraction of execution graphs for anomaly detection,"in Proc. 11thACMCCS, 2004, pp. 318-329. (Pubitemid 40338213)
-
(2004)
Proceedings of the ACM Conference on Computer and Communications Security
, pp. 318-329
-
-
Gao, D.1
Reitert, M.K.2
Song, D.3
-
22
-
-
77950788046
-
Panorama: Capturing system-wide information flow for malware detection and analysis
-
CCS, Oct.
-
H. Yin, D. Song, M. Egele, C. Kruegel, and E. Kirda, "Panorama: Capturing system-wide information flow for malware detection and analysis," in Proc. 14th ACM Conf. CCS, Oct. 2007, pp. 116-127.
-
(2007)
Proc. 14th ACM Conf
, pp. 116-127
-
-
Yin, H.1
Song, D.2
Egele, M.3
Kruegel, C.4
Kirda, E.5
-
23
-
-
0034829697
-
A fast automation-based method for detecting anomalous program behaviors
-
R. Sekar, M. Bendre, P. Bollineni, and D. Dhurjati, "A fast automatonbased approach for detecting anomalous program behaviors," in Proc. IEEE Symp. Sec. Privacy, Jan. 2001, pp. 144-155. (Pubitemid 32882633)
-
(2001)
Proceedings of the IEEE Computer Society Symposium on Research in Security and Privacy
, pp. 144-155
-
-
Sekar, R.1
Bendre, M.2
Dhurjati, D.3
Bollineni, P.4
-
24
-
-
49949090311
-
Learning and classification of malware behavior
-
Jun.
-
T. Holz, C. Willems, K. Rieck, P. Duessel, and P. Laskov, "Learning and classification of malware behavior," in Proc. 5th Conf. DIMVA, Jun. 2008, pp. 108-125.
-
(2008)
Proc. 5th Conf. DIMVA
, pp. 108-125
-
-
Holz, T.1
Willems, C.2
Rieck, K.3
Duessel, P.4
Laskov, P.5
-
25
-
-
78049387622
-
A layered architecture for detecting malicious behaviors
-
Cambridge, MA, USA Sep.
-
L. Martignoni, E. Stinson, M. Fredrikson, S. Jha, and J. C. Mitchell, "A layered architecture for detecting malicious behaviors," in Proc. 11th Int. Symp. Recent Adv. Intrusion Detection, Cambridge, MA, USA, Sep. 2008, pp. 1-20.
-
(2008)
Proc. 11th Int. Symp. Recent Adv. Intrusion Detection
, pp. 1-20
-
-
Martignoni, L.1
Stinson, E.2
Fredrikson, M.3
Jha, S.4
Mitchell, J.C.5
-
26
-
-
0038825045
-
Anomaly detection using call stack information
-
May
-
H. Feng, O. Kolesnikov, P. Folga, W. Lee, and W. Gong, "Anomaly detection using call stack information," in Proc. IEEE Symp. Sec. Privacy, May 2003, pp. 62-75.
-
(2003)
Proc. IEEE Symp. Sec. Privacy
, pp. 62-75
-
-
Feng, H.1
Kolesnikov, O.2
Folga, P.3
Lee, W.4
Gong, W.5
-
27
-
-
70350626575
-
Defending browsers against drive-by downloads: Mitigating heap-spraying code injection attacks
-
Vulnerabil. Assessment, Como, Italy Jul.
-
M. Egele, P. Wurzinger, C. Kruegel, and E. Kirda, "Defending browsers against drive-by downloads: Mitigating heap-spraying code injection attacks," in Proc. 6th Int. Conf. Detection Intrusions Malware, Vulnerabil. Assessment, Como, Italy, Jul. 2009, pp. 88-106.
-
(2009)
Proc. 6th Int. Conf. Detection Intrusions Malware
, pp. 88-106
-
-
Egele, M.1
Wurzinger, P.2
Kruegel, C.3
Kirda, E.4
-
28
-
-
84893361487
-
-
Ph.D. dissertation Dept. Electr. Comput. Eng., Carnegie Mellon Univ., Pittsburgh, PA, USA, Jun.
-
O. Sukwong, H. Kim, and J. Hoe, "An empirical study of commercial antivirus software effectiveness," Ph.D. dissertation, Dept. Electr. Comput. Eng., Carnegie Mellon Univ., Pittsburgh, PA, USA, Jun. 2010.
-
(2010)
An Empirical Study of Commercial Antivirus Software Effectiveness
-
-
Sukwong, O.1
Kim, H.2
Hoe, J.3
-
29
-
-
37849017546
-
Mining specifications of malicious behavior
-
M. Christodorescu, S. Jha, and C. Kruegel, "Mining specifications of malicious behavior," in Proc. 6th Eur. Softw. Eng. Conf. ACM SIGSOFT Symp. Found. Softw. Eng., 2007, pp. 5-14.
-
(2007)
Proc. 6th Eur. Softw. Eng. Conf. ACM SIGSOFT Symp. Found. Softw. Eng.
, pp. 5-14
-
-
Christodorescu, M.1
Jha, S.2
Kruegel, C.3
-
30
-
-
85076206522
-
Effective and efficient malware detection at the end host
-
C. Kolbitsch, P. M. Comparetti, C. Kruegel, E. Kirda, X. Zhou, and X. Wang, "Effective and efficient malware detection at the end host," in Proc. USENIX Sec. Symp., 2009, pp. 351-366.
-
(2009)
Proc. USENIX Sec. Symp.
, pp. 351-366
-
-
Kolbitsch, C.1
Comparetti, P.M.2
Kruegel, C.3
Kirda, E.4
Zhou, X.5
Wang, X.6
-
31
-
-
34548763868
-
Usable mandatory integrity protection for operating systems
-
N. Li, Z. Mao, and H. Chen, "Usable mandatory integrity protection for operating systems," in Proc. IEEE Symp. Sec. Privacy, 2007, pp. 1-15.
-
(2007)
Proc. IEEE Symp. Sec. Privacy
, pp. 1-15
-
-
Li, N.1
Mao, Z.2
Chen, H.3
-
32
-
-
85077680022
-
Behaviorbased spyware detection
-
San Diego, CA, USA Feb.
-
E. Kirda, C. Kruegel, G. Banks, G. Vigna, and R. Kemmerer, "Behaviorbased spyware detection," in Proc. USENIX Sec. Symp., San Diego, CA, USA, Feb. 2006, pp. 1-19.
-
(2006)
Proc. USENIX Sec. Symp.
, pp. 1-19
-
-
Kirda, E.1
Kruegel, C.2
Banks, G.3
Vigna, G.4
Kemmerer, R.5
-
33
-
-
57349125651
-
Behavioral detection of malware on mobile handsets
-
Services, Breckenridge, CO, USA Jun.
-
A. Bose, X. Hu, K. G. Shin, and T. Park, "Behavioral detection of malware on mobile handsets," in Proc. 6th Int. Conf. Mobile Syst., Appl., Services, Breckenridge, CO, USA, Jun. 2008, pp. 225-238.
-
(2008)
Proc. 6th Int. Conf. Mobile Syst., Appl
, pp. 225-238
-
-
Bose, A.1
Hu, X.2
Shin, K.G.3
Park, T.4
-
34
-
-
80755143401
-
Crowdroid: Behaviorbased malware detection system for Android
-
I. Burguera, U. Zurutuza, and S. N. Tehrani, "Crowdroid: Behaviorbased malware detection system for Android," in Proc. 1st ACM Workshop Sec. SPSMD, 2011, pp. 15-26.
-
(2011)
Proc. 1st ACM Workshop Sec. SPSMD
, pp. 15-26
-
-
Burguera, I.1
Zurutuza, U.2
Tehrani, S.N.3
-
35
-
-
84875048225
-
-
PC Magazine, New York, NY USA [Online].Available
-
PC Magazine, New York, NY, USA. (2013). PC Magazine Benchmarks [Online]. Available: http://www.pcmag.com/encyclopedia-term/0,2542,t=WebBenchi=48947,00. asp
-
(2013)
PC Magazine Benchmarks
-
-
|