-
2
-
-
85015607344
-
Targeted attacks detection with spunge
-
Balduzzi, M., Ciangaglini, V., McArdle, R.: Targeted attacks detection with spunge. Trend Micro Research, EMEA (2013)
-
(2013)
Trend Micro Research, EMEA
-
-
Balduzzi, M.1
Ciangaglini, V.2
McArdle, R.3
-
3
-
-
84977072616
-
-
Becker, G.T., Regazzoni, F., Paar, C., Burleson, W.P.: Stealthy dopant-level hardware trojans (2013)
-
(2013)
Stealthy Dopant-level Hardware Trojans
-
-
Becker, G.T.1
Regazzoni, F.2
Paar, C.3
Burleson, W.P.4
-
4
-
-
84894191142
-
The cousins of stuxnet: Duqu, flame, and gauss
-
Bencsáth, B., Pék, G., Buttyán, L., Félegyházi, M.: The cousins of stuxnet: Duqu, flame, and gauss. Future Internet 4(4), 971-1003 (2012)
-
(2012)
Future Internet
, vol.4
, Issue.4
, pp. 971-1003
-
-
Bencsáth, B.1
Pék, G.2
Buttyán, L.3
Félegyházi, M.4
-
6
-
-
84872964738
-
-
Virology and Cryptology Laboratory, French Army Signals Academy
-
Blonce, A., Filiol, E., Frayssignes, L.: Portable document format (pdf) security analysis and malware threats. Tech. rep., Virology and Cryptology Laboratory, French Army Signals Academy (2008)
-
(2008)
Portable Document Format (pdf) Security Analysis and Malware Threats. Tech. Rep
-
-
Blonce, A.1
Filiol, E.2
Frayssignes, L.3
-
7
-
-
85149612939
-
Fast effective rule induction
-
Cohen, W.W.: Fast effective rule induction. ICML 95, 115-123 (1995)
-
(1995)
ICML
, vol.95
, pp. 115-123
-
-
Cohen, W.W.1
-
8
-
-
84874568863
-
-
Desnos, A., Erra, R., Filiol, E.: Processor-dependent malwaret and codes. arXiv preprint arXiv:1011.1638 (2010)
-
(2010)
Processor-dependent Malwaret and Codes. ArXiv Preprint ArXiv
, vol.1011
, pp. 1638
-
-
Desnos, A.1
Erra, R.2
Filiol, E.3
-
9
-
-
78649265912
-
Malware type recognition and cyber situational awareness
-
IEEE
-
Dube, T., Raines, R., Peterson, G., Bauer, K., Grimaila, M., Rogers, S.: Malware type recognition and cyber situational awareness. In: Second International Conference on Social Computing (SocialCom), pp. 938-943. IEEE (2010)
-
(2010)
Second International Conference On Social Computing (SocialCom)
, pp. 938-943
-
-
Dube, T.1
Raines, R.2
Peterson, G.3
Bauer, K.4
Grimaila, M.5
Rogers, S.6
-
10
-
-
84856006502
-
Malware target recognition via static heuristics
-
Dube, T., Raines, R., Peterson, G., Bauer, K., Grimaila, M., Rogers, S.: Malware target recognition via static heuristics. Computers & Security 31(1), 137-147 (2012)
-
(2012)
Computers & Security
, vol.31
, Issue.1
, pp. 137-147
-
-
Dube, T.1
Raines, R.2
Peterson, G.3
Bauer, K.4
Grimaila, M.5
Rogers, S.6
-
12
-
-
84880570808
-
Malware target recognition of unknown threats
-
September
-
Dube, T.E., Raines, R.A., Grimaila, M.R., Bauer, K., Rogers, S.: Malware target recognition of unknown threats. IEEE Systems Journal 7(3) (September 2013)
-
(2013)
IEEE Systems Journal
, vol.7
, Issue.3
-
-
Dube, T.E.1
Raines, R.A.2
Grimaila, M.R.3
Bauer, K.4
Rogers, S.5
-
13
-
-
84904729610
-
-
US Patent 20, 120, 260, 342 (October 11
-
Dube, T.E., Raines, R.A., Rogers, S.K.: Malware target recognition. US Patent 20, 120, 260, 342 (October 11, 2012)
-
(2012)
Malware Target Recognition
-
-
Dube, T.E.1
Raines, R.A.2
Rogers, S.K.3
-
14
-
-
34249847782
-
Formalisation and implementation aspects of k-ary (malicious) codes
-
Filiol, E.: Formalisation and implementation aspects of k-ary (malicious) codes. Journal in Computer Virology 3(2), 75-86 (2007)
-
(2007)
Journal In Computer Virology
, vol.3
, Issue.2
, pp. 75-86
-
-
Filiol, E.1
-
16
-
-
33746896615
-
Open problems in computer virology
-
Filiol, E., Helenius, M., Zanero, S.: Open problems in computer virology. Journal in Computer Virology 1(3-4), 55-66 (2006)
-
(2006)
Journal In Computer Virology
, vol.1
, Issue.3-4
, pp. 55-66
-
-
Filiol, E.1
Helenius, M.2
Zanero, S.3
-
17
-
-
33845768389
-
Learning to detect and classify malicious executables in the wild
-
Kolter, J.Z., Maloof, M.A.: Learning to detect and classify malicious executables in the wild. The Journal of Machine Learning Research 7, 2721-2744 (2006)
-
(2006)
The Journal of Machine Learning Research
, vol.7
, pp. 2721-2744
-
-
Kolter, J.Z.1
Maloof, M.A.2
-
18
-
-
37749050180
-
Dynamic weighted majority: An ensemble method for drifting concepts
-
Kolter, J.Z., Maloof, M.A.: Dynamic weighted majority: An ensemble method for drifting concepts. The Journal of Machine Learning Research 8, 2755-2790 (2007)
-
(2007)
The Journal of Machine Learning Research
, vol.8
, pp. 2755-2790
-
-
Kolter, J.Z.1
Maloof, M.A.2
-
21
-
-
84855859636
-
Evidence of advanced persistent threat: A case study of malware for political espionage
-
IEEE
-
Li, F., Lai, A., Ddl, D.: Evidence of advanced persistent threat: A case study of malware for political espionage. In: 6th International Conference on Malicious and Unwanted Software (Malware), pp. 102-109. IEEE (2011)
-
(2011)
6th International Conference On Malicious and Unwanted Software (Malware)
, pp. 102-109
-
-
Li, F.1
Lai, A.2
Ddl, D.3
-
22
-
-
70449730263
-
Trojan side-channels: Lightweight hardware trojans through side-channel engineering
-
In: Clavier, C., Gaj, K. (eds.), LNCS, Springer, Heidelberg
-
Lin, L., Kasper, M., G̈uneysu, T., Paar, C., Burleson, W.: Trojan side-channels: Lightweight hardware trojans through side-channel engineering. In: Clavier, C., Gaj, K. (eds.) CHES 2009. LNCS, vol. 5747, pp. 382-395. Springer, Heidelberg (2009)
-
(2009)
CHES 2009
, vol.5747
, pp. 382-395
-
-
Lin, L.1
Kasper, M.2
G̈uneysu, T.3
Paar, C.4
Burleson, W.5
-
23
-
-
84904731397
-
N-victims: An approach to determine nvictims for apt investigations
-
In: Lee, D.H., Yung, M. (eds.), Springer, Heidelberg
-
Liu, S.-T., Chen, Y.-M., Hung, H.-C.: N-victims: An approach to determine nvictims for apt investigations. In: Lee, D.H., Yung, M. (eds.) WISA 2012. LNCS, vol. 7690, pp. 226-240. Springer, Heidelberg (2012)
-
(2012)
WISA 2012. LNCS
, vol.7690
, pp. 226-240
-
-
Liu, S.-T.1
Chen, Y.-M.2
Hung, H.-C.3
-
24
-
-
83755220464
-
Using multi-feature and classifier ensembles to improve malware detection
-
Lu, Y., Din, S., Zheng, C., Gao, B.: Using multi-feature and classifier ensembles to improve malware detection. Journal of CCIT 39(2), 57-72 (2010)
-
(2010)
Journal of CCIT
, vol.39
, Issue.2
, pp. 57-72
-
-
Lu, Y.1
Din, S.2
Zheng, C.3
Gao, B.4
-
25
-
-
34047129159
-
Using entropy analysis to find encrypted and packed malware
-
Lyda, R., Hamrock, J.: Using entropy analysis to find encrypted and packed malware. IEEE Security & Privacy 5(2), 40-45 (2007)
-
(2007)
IEEE Security & Privacy
, vol.5
, Issue.2
, pp. 40-45
-
-
Lyda, R.1
Hamrock, J.2
-
26
-
-
84893461845
-
Stuxnet 0.5: The missing link
-
McDonald, G., Murchu, L.O., Doherty, S., Chien, E.: Stuxnet 0.5: The missing link. Symantec Security Response (online) 26 (2013)
-
(2013)
Symantec Security Response (online)
, pp. 26
-
-
McDonald, G.1
Murchu, L.O.2
Doherty, S.3
Chien, E.4
-
27
-
-
84904745533
-
Key internet operator verisign hit by hackers
-
February 2
-
Menn, J.: Key internet operator verisign hit by hackers. Reuters (February 2, 2012)
-
(2012)
Reuters
-
-
Menn, J.1
-
29
-
-
84904735646
-
-
Prosecutors, Public: Messiah spyware infects middle east targets
-
Prosecutors, Public: Messiah spyware infects middle east targets
-
-
-
-
31
-
-
84904396614
-
A control measure framework to limit collateral damage and propagation of cyber weapons
-
IEEE
-
Raymond, D., Conti, G., Cross, T., Fanelli, R.: A control measure framework to limit collateral damage and propagation of cyber weapons. In: Fifth International Conference on Cyber Conflict (CyCon), pp. 1-16. IEEE (2013)
-
(2013)
Fifth International Conference On Cyber Conflict (CyCon)
, pp. 1-16
-
-
Raymond, D.1
Conti, G.2
Cross, T.3
Fanelli, R.4
-
32
-
-
82055172109
-
Using opcode sequences in single-class learning to detect unknown malware
-
Santos, I., Brezo, F., Sanz, B., Laorden, C., Bringas, P.G.: Using opcode sequences in single-class learning to detect unknown malware. IET Information Security 5(4), 220-227 (2011)
-
(2011)
IET Information Security
, vol.5
, Issue.4
, pp. 220-227
-
-
Santos, I.1
Brezo, F.2
Sanz, B.3
Laorden, C.4
Bringas, P.G.5
-
33
-
-
84861726546
-
Opcode sequences as representation of executables for data-mining-based unknown malware detection
-
Santos, I., Brezo, F., Ugarte-Pedrero, X., Bringas, P.G.: Opcode sequences as representation of executables for data-mining-based unknown malware detection. Information Sciences (2011)
-
(2011)
Information Sciences
-
-
Santos, I.1
Brezo, F.2
Ugarte-Pedrero, X.3
Bringas, P.G.4
-
34
-
-
80052977357
-
Semi-supervised learning for unknown malware detection
-
Abraham, A., Corchado, J.M., González, S.R., De Paz Santana, J.F. (eds.) AISC, Springer, Heidelberg
-
Santos, I., Nieves, J., Bringas, P.G.: Semi-supervised learning for unknown malware detection. In: Abraham, A., Corchado, J.M., González, S.R., De Paz Santana, J.F. (eds.) International Symposium on DCAI. AISC, vol. 91, pp. 415-422. Springer, Heidelberg (2011)
-
(2011)
International Symposium On DCAI
, vol.91
, pp. 415-422
-
-
Santos, I.1
Nieves, J.2
Bringas, P.G.3
-
35
-
-
0034838197
-
Data mining methods for detection of new malicious executables
-
S&P, IEEE
-
Schultz, M.G., Eskin, E., Zadok, F., Stolfo, S.J.: Data mining methods for detection of new malicious executables. In: Proceedings of the 2001 IEEE Symposium on Security and Privacy, S&P 2001, pp. 38-49. IEEE (2001)
-
(2001)
Proceedings of the 2001 IEEE Symposium On Security and Privacy
, pp. 38-49
-
-
Schultz, M.G.1
Eskin, E.2
Zadok, F.3
Stolfo, S.J.4
-
36
-
-
65749099969
-
Detection of malicious code by applying machine learning classifiers on static features: A state-of-the-art survey
-
Shabtai, A., Moskovitch, R., Elovici, Y., Glezer, C.: Detection of malicious code by applying machine learning classifiers on static features: A state-of-the-art survey. Information Security Technical Report 14(1), 16-29 (2009)
-
(2009)
Information Security Technical Report
, vol.14
, Issue.1
, pp. 16-29
-
-
Shabtai, A.1
Moskovitch, R.2
Elovici, Y.3
Glezer, C.4
-
37
-
-
79958243228
-
Pe-probe: Leveraging packer detection and structural information to detect malicious portable executables
-
Shafiq, M., Tabish, S., Farooq, M.: Pe-probe: leveraging packer detection and structural information to detect malicious portable executables. In: Proceedings of the Virus Bulletin Conference (VB), pp. 29-33 (2009)
-
(2009)
Proceedings of the Virus Bulletin Conference (VB)
, pp. 29-33
-
-
Shafiq, M.1
Tabish, S.2
Farooq, M.3
-
38
-
-
84856698198
-
-
Tech. rep., TR-nexGINRC-2009-21 (January 2009)
-
Shafiq, M.Z., Tabish, S.M., Mirza, F., Farooq, M.: A framework for efficient mining of structural information to detect zero-day malicious portable executables. Tech. rep., TR-nexGINRC-2009-21 (January 2009), http://www.nexginrc.org/papers/tr21-zubair.pdf
-
A Framework For Efficient Mining of Structural Information to Detect Zero-day Malicious Portable Executables
-
-
Shafiq, M.Z.1
Tabish, S.M.2
Mirza, F.3
Farooq, M.4
-
39
-
-
76649143365
-
Pe-miner:Mining structural information to detect malicious executables in realtime
-
In: Kirda, E., Jha, S., Balzarotti, D. (eds.), Springer, Heidelberg
-
Shafiq, M.Z., Tabish, S.M., Mirza, F., Farooq, M.: Pe-miner:mining structural information to detect malicious executables in realtime. In: Kirda, E., Jha, S., Balzarotti, D. (eds.) RAID 2009. LNCS, vol. 5758, pp. 121-141. Springer, Heidelberg (2009)
-
(2009)
RAID 2009. LNCS
, vol.5758
, pp. 121-141
-
-
Shafiq, M.Z.1
Tabish, S.M.2
Mirza, F.3
Farooq, M.4
-
41
-
-
78651410940
-
Gpu-assisted malware
-
IEEE
-
Vasiliadis, G., Polychronakis, M., Ioannidis, S.: Gpu-assisted malware. In: 2010 5th International Conference on Malicious and Unwanted Software (MALWARE), pp. 1-6. IEEE (2010)
-
(2010)
2010 5th International Conference On Malicious and Unwanted Software (MALWARE)
, pp. 1-6
-
-
Vasiliadis, G.1
Polychronakis, M.2
Ioannidis, S.3
-
42
-
-
0043037096
-
Open problems in computer virus research
-
White, S.R.: Open problems in computer virus research. In: Virus Bulletin Conference (1998)
-
(1998)
Virus Bulletin Conference
-
-
White, S.R.1
-
43
-
-
79961077465
-
Google hack attack was ultra sophisticated, new details show
-
Zetter, K.: Google hack attack was ultra sophisticated, new details show. Wired Magazine 14 (2010)
-
(2010)
Wired Magazine
, pp. 14
-
-
Zetter, K.1
-
44
-
-
38049020213
-
Malicious codes detection based on ensemble learning
-
In: Xiao, B., Yang, L.T., Ma, J., Muller-Schloer, C., Hua, Y. (eds.), Springer, Heidelberg
-
Zhang, B., Yin, J., Hao, J., Zhang, D., Wang, S.: Malicious codes detection based on ensemble learning. In: Xiao, B., Yang, L.T., Ma, J., Muller-Schloer, C., Hua, Y. (eds.) ATC 2007. LNCS, vol. 4610, pp. 468-477. Springer, Heidelberg (2007)
-
(2007)
ATC 2007. LNCS
, vol.4610
, pp. 468-477
-
-
Zhang, B.1
Yin, J.2
Hao, J.3
Zhang, D.4
Wang, S.5
|