-
1
-
-
77956577255
-
TTAnalyze: A Tool for Analyzing Malware
-
Bayer, U., Kruegel, C., Kirda, E.: TTAnalyze: A Tool for Analyzing Malware. In: 15th European Institute for Computer Antivirus Research, EICAR (2006)
-
(2006)
15th European Institute for Computer Antivirus Research, EICAR
-
-
Bayer, U.1
Kruegel, C.2
Kirda, E.3
-
2
-
-
80052179046
-
Korset: Automated, Zero False-Alarm Intrusion Detection for Linux
-
Ben-Cohen, O., Wool, A.: Korset: Automated, Zero False-Alarm Intrusion Detection for Linux. In: Linux Symposium (2008)
-
(2008)
Linux Symposium
-
-
Ben-Cohen, O.1
Wool, A.2
-
3
-
-
84873617895
-
Duqu: Analysis, Detection, and Lessons Learned
-
Bencsáth, B., Pék, G., Buttyán, L., Félegyházi, M.: Duqu: Analysis, Detection, and Lessons Learned. In: European Workshop on System Security, EuroSec (2012)
-
European Workshop on System Security, EuroSec (2012)
-
-
Bencsáth, B.1
Pék, G.2
Buttyán, L.3
Félegyhá zi, M.4
-
4
-
-
70349240080
-
Ether: Malware Analysis via Hardware Virtualization Extensions
-
Dinaburg, A., Royal, P., Sharif, M., Lee, W.: Ether: Malware Analysis via Hardware Virtualization Extensions. In: ACM Conference on Computer and Communications Security, CCS (2008)
-
ACM Conference on Computer and Communications Security, CCS (2008)
-
-
Dinaburg, A.1
Royal, P.2
Sharif, M.3
Lee, W.4
-
9
-
-
54049106582
-
Virtual Machine Introspection: Observation or Interference?
-
Nance, K., Bishop, M., Hay, B.: Virtual Machine Introspection: Observation or Interference? IEEE Security and Privacy 6(5) (2008)
-
(2008)
IEEE Security and Privacy
, vol.6
, pp. 5
-
-
Nance, K.1
Bishop, M.2
Hay, B.3
-
10
-
-
41149103393
-
SecVisor: A Tiny Hypervisor to Provide Lifetime Kernel Code Integrity for Commodity OSes
-
Seshadri, A., Luk, M., Qu, N., Perrig, A.: SecVisor: A Tiny Hypervisor to Provide Lifetime Kernel Code Integrity for Commodity OSes. In: The 21st ACM Symposium on Operating Systems Principles, SOSP (2007)
-
(2007)
The 21st ACM Symposium on Operating Systems Principles, SOSP
-
-
Seshadri, A.1
Luk, M.2
Qu, N.3
Perrig, A.4
-
11
-
-
67650079952
-
BitVisor: A Thin Hypervisor for Enforcing I/O Device Security
-
Shinagawa, T., et al.: BitVisor: A Thin Hypervisor for Enforcing I/O Device Security, Virtual Execution Environments, VEE (2009)
-
(2009)
Virtual Execution Environments, VEE
-
-
Shinagawa, T.1
-
12
-
-
58449129985
-
BitBlaze: A New Approach to Computer Security via Binary Analysis
-
Song, D., Brumley, D., Yin, H., Caballero, J., Jager, I., Kang, M.G., Liang, Z., Newsome, J., Poosankam, P., Saxena, P.: BitBlaze: A New Approach to Computer Security via Binary Analysis. In: International Conference on Information Systems Security, ICISS (2008)
-
International Conference on Information Systems Security, ICISS (2008)
-
-
Song, D.1
Brumley, D.2
Yin, H.3
Caballero, J.4
Jager, I.5
Kang, M.G.6
Liang, Z.7
Newsome, J.8
Poosankam, P.9
Saxena, P.10
-
13
-
-
21644451622
-
Improving the Reliability of Commodity Operating Systems
-
Swift, M.M., Bershad, B.N., Levy, H.M.: Improving the Reliability of Commodity Operating Systems. In: 19th ACM Symposium on Operating Systems Principles, SOSP (2003)
-
(2003)
19th ACM Symposium on Operating Systems Principles, SOSP
-
-
Swift, M.M.1
Bershad, B.N.2
Levy, H.M.3
-
15
-
-
85093189156
-
Practical Protection of Kernel Integrity for Commodity OS from Untrusted Extension
-
Xiong, X., Tian, D., Liu, P.: Practical Protection of Kernel Integrity for Commodity OS from Untrusted Extension. In: 18th Annual Network & Distributed System Security Symposium, NDSS (2011)
-
(2011)
18th Annual Network & Distributed System Security Symposium, NDSS
-
-
Xiong, X.1
Tian, D.2
Liu, P.3
-
16
-
-
84863351787
-
V2E: Combining hardware virtualization and softwareemulation for transparent and extensible malware analysis
-
Yan, L., Jayachandra, M., Zhang, M., Yin, H.: V2E: combining hardware virtualization and softwareemulation for transparent and extensible malware analysis, Virtual Execution Environments, VEE (2012)
-
(2012)
Virtual Execution Environments, VEE
-
-
Yan, L.1
Jayachandra, M.2
Zhang, M.3
Yin, H.4
|