-
7
-
-
33748932391
-
Dynamic Analysis of Malicious Code
-
Bayer, U., et al.: Dynamic Analysis of Malicious Code. Journal in Computer Virology 2(1), 67–77 (2006)
-
(2006)
Journal in Computer Virology
, vol.2
, Issue.1
, pp. 67-77
-
-
Bayer, U.1
-
10
-
-
84858392040
-
A Survey on Automated Dynamic Malware Analysis Techniques and Tools
-
Egele, M., et al.: A Survey on Automated Dynamic Malware Analysis Techniques and Tools. ACM Comput. Surv. 44(2), 1–42 (2012)
-
(2012)
ACM Comput. Surv.
, vol.44
, Issue.2
, pp. 1-42
-
-
Egele, M.1
-
17
-
-
84873942306
-
-
Gladyshev, P., Rogers, M.K. (eds.) , Springer, Heidelberg
-
Shosha, A.F., James, J.I., Gladyshev, P.: A Novel Methodology for Malware Intrusion Attack Path Reconstruction. In: Gladyshev, P., Rogers, M.K. (eds.) ICDF2C 2011. LNICST, vol. 88, pp. 131–140. Springer, Heidelberg (2012)
-
(2012)
A Novel Methodology for Malware Intrusion Attack Path Reconstruction
, vol.88
, pp. 131-140
-
-
Shosha, A.F.1
James, J.I.2
Gladyshev, P.3
-
18
-
-
3042854565
-
Finite State Machine Approach to Digital Event Reconstruction
-
Gladyshev, P., Patel, A.: Finite State Machine Approach to Digital Event Reconstruction. In: Digital Investigation (2004)
-
(2004)
Digital Investigation
-
-
Gladyshev, P.1
Patel, A.2
-
22
-
-
85175131942
-
Characterizing Kernel Malware Behavior With Kernel Data Access Patterns. In: Proceedings of the 6th ACM Symposium on Information
-
Rhee, J., Lin, Z., Xu, D.: Characterizing Kernel Malware Behavior With Kernel Data Access Patterns. In: Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security (2011)
-
(2011)
Computer and Communications Security
-
-
Rhee, J.1
Lin, Z.2
Xu, D.3
-
23
-
-
84885885812
-
Malware Forensics: Investigating and Analyzing Malicious Code
-
Malin, C., Casey, E., Aquilina, J.: Malware Forensics: Investigating and Analyzing Malicious Code. Syngress (2008)
-
(2008)
Syngress
-
-
Malin, C.1
Casey, E.2
Aquilina, J.3
-
25
-
-
77955182005
-
All You Ever Wanted to Know About Dynamic Taint Analysis and Forward Symbolic Execution
-
(Oakland 2010)
-
Schwartz, E., Avgerinos, T., Brumley, D.: All You Ever Wanted to Know About Dynamic Taint Analysis and Forward Symbolic Execution. In: IEEE Symposium on Security and Privacy (Oakland 2010) (2010)
-
(2010)
IEEE Symposium on Security and Privacy
-
-
Schwartz, E.1
Avgerinos, T.2
Brumley, D.3
-
26
-
-
85025162327
-
-
Volatility.: An Advanced Memory Forensics Framework (2012), https://www.volatilesystems.com/default/volatility
-
(2012)
-
-
-
27
-
-
34447559706
-
The VAD Tree: A Process-Eye View of Physical Memory
-
Dolan-Gavitt, B.: The VAD Tree: A Process-Eye View of Physical Memory. In: Digital Investigation (2007)
-
(2007)
Digital Investigation
-
-
Dolan-Gavitt, B.1
-
30
-
-
84876893644
-
Rootkits: Subverting the Windows Kernel
-
Hoglund, G.: Rootkits: Subverting the Windows Kernel. Addison-Wesley (2005)
-
(2005)
Addison-Wesley
-
-
Hoglund, G.1
-
38
-
-
84872062869
-
Evasion-Resistant Malware Signature Based on Profiling Kernel Data Structure Objects
-
Shosha, F.A., James, J., Chen-Ching, L., Gladyshev, P.: Evasion-Resistant Malware Signature Based on Profiling Kernel Data Structure Objects. In: Proceedings of the 7th Intl. Conference on Risks and Security of Internet Systems (CRiSIS) (2012)
-
(2012)
Proceedings of the 7Th Intl. Conference on Risks and Security of Internet Systems (Crisis)
-
-
Shosha, F.A.1
James, J.2
Chen-Ching, L.3
Gladyshev, P.4
-
39
-
-
84867876676
-
Towards Automated Forensic Event Reconstruction of Malicious Code (Poster abstract)
-
Balzarotti, D., Stolfo, S.J., Cova, M. (eds.) , Springer, Heidelberg
-
Shosha, A.F., James, J.I., Liu, C.-C., Gladyshev, P.: Towards Automated Forensic Event Reconstruction of Malicious Code (Poster abstract). In: Balzarotti, D., Stolfo, S.J., Cova, M. (eds.) RAID 2012. LNCS, vol. 7462, pp. 388–389. Springer, Heidelberg (2012)
-
(2012)
RAID 2012. LNCS
, vol.7462
, pp. 388-389
-
-
Shosha, A.F.1
James, J.I.2
Liu, C.-C.3
Gladyshev, P.4
|