-
1
-
-
85076294158
-
-
HtmlUnit. http://htmlunit.sourceforge.net/.
-
-
-
-
2
-
-
84937686920
-
-
JavaScript for Acrobat API Reference. http://wwwimages.adobe.com/www.adobe.com/content/dam/Adobe/en/devnet/acrobat/pdfs/js_api-reference.pdf.
-
JavaScript for Acrobat API Reference
-
-
-
3
-
-
84872113696
-
Efficient detection of split personalities in malware
-
D. Balzarotti, M. Cova, C. Karlberger, C. Kruegel, E. Kirda, and G. Vigna. Efficient Detection of Split Personalities in Malware. In Proc. of the Symposium on Network and Distributed System Security (NDSS), 2010.
-
(2010)
Proc. Of the Symposium on Network and Distributed System Security (NDSS)
-
-
Balzarotti, D.1
Cova, M.2
Karlberger, C.3
Kruegel, C.4
Kirda, E.5
Vigna, G.6
-
4
-
-
77955038057
-
Scalable, behavior-based malware clustering
-
U. Bayer, P. M. Comparetti, C. Hlauschek, C. Kruegel, and E. Kirda. Scalable, Behavior-Based Malware Clustering. In Proc. of the Symposium on Network and Distributed System Security (NDSS), 2009.
-
(2009)
Proc. Of the Symposium on Network and Distributed System Security (NDSS)
-
-
Bayer, U.1
Comparetti, P.M.2
Hlauschek, C.3
Kruegel, C.4
Kirda, E.5
-
11
-
-
84871985573
-
-
Google. Safe Browsing API. http://code.google.com/apis/safebrowsing/.
-
Safe Browsing API
-
-
-
12
-
-
84869388520
-
Manufacturing compromise: The emergenceof exploit-as-a-service
-
C. Grier, L. Ballard, J. Caballero, N. Chachra, C. J. Dietrich, K. Levchenko, P. Mavrommatis, D. McCoy, A. Nappa, A. Pitsillidis, N. Provos, M. Z. Rafique, M.A. Rajab, C. Rossow, K. Thomas, V. Paxson, S. Savage, and G. M. Voelker. Manufacturing Compromise: The Emergenceof Exploit-as-a-Service. In Proc. of the ACM Conference on Computer and Communications Security (CCS), 2012.
-
(2012)
Proc. Of the ACM Conference on Computer and Communications Security (CCS)
-
-
Grier, C.1
Ballard, L.2
Caballero, J.3
Chachra, N.4
Dietrich, C.J.5
Levchenko, K.6
Mavrommatis, P.7
McCoy, D.8
Nappa, A.9
Pitsillidis, A.10
Provos, N.11
Rafique, M.Z.12
Rajab, M.A.13
Rossow, C.14
Thomas, K.15
Paxson, V.16
Savage, S.17
Voelker, G.M.18
-
15
-
-
74049124856
-
Emulating emulation-resistant malware
-
M. G. Kang, H. Yin, S. Hanna, S. McCamant, and D. Song. Emulating Emulation-Resistant Malware. In Proc. of the Workshop on Virtual Machine Security (VMSec), 2009.
-
(2009)
Proc. Of the Workshop on Virtual Machine Security (VMSec)
-
-
Kang, M.G.1
Yin, H.2
Hanna, S.3
McCamant, S.4
Song, D.5
-
22
-
-
84890063425
-
-
Microsoft Technical report, Microsoft Corporation
-
Microsoft. Microsoft Security Intelligence Report, Volume 13. Technical report, Microsoft Corporation, 2012.
-
(2012)
Microsoft Security Intelligence Report
, vol.13
-
-
-
29
-
-
85080711655
-
The ghost in the browser: Analysis of web-based malware
-
N. Provos, D. McNamee, P. Mavrommatis, K. Wang, and N. Modadugu. The Ghost in the Browser: Analysis of Web-based Malware. In Proc. of the USENIX Workshop on Hot Topics in Understanding Botnet, 2007.
-
(2007)
Proc. Of the USENIX Workshop on Hot Topics in Understanding Botnet
-
-
Provos, N.1
McNamee, D.2
Mavrommatis, P.3
Wang, K.4
Modadugu, N.5
-
31
-
-
84860775300
-
-
Technical report, Google
-
M. A. Rajab, L. Ballard, N. Jagpal, P. Mavrommatis, D. Nojiri, N. Provos, and L. Schmidt. Trends in Circumventing Web-Malware Detection. Technical report, Google, 2011.
-
(2011)
Trends in Circumventing Web-Malware Detection
-
-
Rajab, M.A.1
Ballard, L.2
Jagpal, N.3
Mavrommatis, P.4
Nojiri, D.5
Provos, N.6
Schmidt, L.7
-
38
-
-
84872102454
-
-
The Honeynet Project. Capture-HPC. https://projects.honeynet.org/capture-hpc.
-
Capture-HPC
-
-
-
40
-
-
33750356750
-
Automated web patrol with strider HoneyMonkeys: Finding web sites that exploit browser vulnerabilities
-
Y.-M. Wang, D. Beck, X. Jiang, R. Roussev, C. Verbowski, S. Chen, and S. King. Automated Web Patrol with Strider HoneyMonkeys: Finding Web Sites That Exploit Browser Vulnerabilities. In Proc. of the Symposium on Network and Distributed System Security (NDSS), 2006.
-
(2006)
Proc. Of the Symposium on Network and Distributed System Security (NDSS)
-
-
Wang, Y.-M.1
Beck, D.2
Jiang, X.3
Roussev, R.4
Verbowski, C.5
Chen, S.6
King, S.7
|