-
1
-
-
38149089416
-
Automated classiffcation and analysis of internet malware
-
RAID
-
M. Bailey, J. Oberheide, J. Andersen, Z. M. Mao, F. Jahanian, and J. Nazario. Automated classiffcation and analysis of internet malware. In Recent Adances in Intrusion Detection (RAID), pages 178{197, 2007.
-
(2007)
Recent Adances in Intrusion Detection
, pp. 178-197
-
-
Bailey, M.1
Oberheide, J.2
Andersen, J.3
Mao, Z.M.4
Jahanian, F.5
Nazario, J.6
-
2
-
-
33845989821
-
Can machine learning be secure
-
New York, NY, USA, ACM
-
M. Barreno, B. Nelson, R. Sears, A. D. Joseph, and J. D. Tygar. Can machine learning be secure? In ASIACCS '06: Proceedings of the 2006 ACM Symposium on Information, computer and communications security, pages 16{25, New York, NY, USA, 2006. ACM.
-
(2006)
ASIACCS '06: Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security
, pp. 16-25
-
-
Barreno, M.1
Nelson, B.2
Sears, R.3
Joseph, A.D.4
Tygar, J.D.5
-
3
-
-
85043201839
-
Scalable, behavior-based malware clustering
-
NDSS
-
U. Bayer, P. Comparetti, C. Hlauschek, C. Kruegel, and E. Kirda. Scalable, behavior-based malware clustering. In Proc. of Network and Distributed System Security Symposium (NDSS), 2009.
-
(2009)
Proc. of Network and Distributed System Security Symposium
-
-
Bayer, U.1
Comparetti, P.2
Hlauschek, C.3
Kruegel, C.4
Kirda, E.5
-
4
-
-
84937722436
-
Poisoning completelinkage hierarchical clustering
-
press
-
B. Biggio, S. R. Bulò, I. Pillai, M. Mura, E. Z. Mequanint, M. Pelillo, and F. Roli. Poisoning completelinkage hierarchical clustering. In Structural, Syntactic, and Statistical Pattern Recognition, 2014, In press.
-
(2014)
Structural, Syntactic, and Statistical Pattern Recognition
-
-
Biggio, B.1
Bulò, S.R.2
Pillai, I.3
Mura, M.4
Mequanint, E.Z.5
Pelillo, M.6
Roli, F.7
-
5
-
-
84886493283
-
Evasion attacks against machine learning at test time
-
H. Blockeel, K. Kersting, S. Nijssen, and F. Zelezny, editors, Springer Berlin Heidelberg
-
B. Biggio, I. Corona, D. Maiorca, B. Nelson, N. Šrndić , P. Laskov, G. Giacinto, and F. Roli. Evasion attacks against machine learning at test time. In H. Blockeel, K. Kersting, S. Nijssen, and F. Železný, editors, European Conference on Machine Learning and Principles and Practice of Knowledge Discovery in Databases (ECML PKDD), Part III, volume 8190 of Lecture Notes in Computer Science, pages 387{402. Springer Berlin Heidelberg, 2013.
-
(2013)
European Conference on Machine Learning and Principles and Practice of Knowledge Discovery in Databases (ECML PKDD), Part III, Volume 8190 of Lecture Notes in Computer Science
, pp. 387-402
-
-
Biggio, B.1
Corona, I.2
Maiorca, D.3
Nelson, B.4
Šrndić, N.5
Laskov, P.6
Giacinto, G.7
Roli, F.8
-
6
-
-
84927956444
-
Security evaluation of support vector machines in adversarial environments
-
Y. Ma and G. Guo, editors, Springer International Publishing
-
B. Biggio, I. Corona, B. Nelson, B. Rubinstein, D. Maiorca, G. Fumera, G. Giacinto, and F. Roli. Security evaluation of support vector machines in adversarial environments. In Y. Ma and G. Guo, editors, Support Vector Machines Applications, pages 105{153. Springer International Publishing, 2014.
-
(2014)
Support Vector Machines Applications
, pp. 105-153
-
-
Biggio, B.1
Corona, I.2
Nelson, B.3
Rubinstein, B.4
Maiorca, D.5
Fumera, G.6
Giacinto, G.7
Roli, F.8
-
7
-
-
84992268362
-
Security evaluation of pattern classiffers under attack
-
April
-
B. Biggio, G. Fumera, and F. Roli. Security evaluation of pattern classiffers under attack. IEEE Transactions on Knowledge and Data Engineering, 26(4):984{996, April 2014.
-
(2014)
IEEE Transactions on Knowledge and Data Engineering
, vol.26
, Issue.4
, pp. 984-996
-
-
Biggio, B.1
Fumera, G.2
Roli, F.3
-
8
-
-
84867136631
-
Poisoning attacks against support vector machines
-
J. Langford and J. Pineau, editors, Omnipress
-
B. Biggio, B. Nelson, and P. Laskov. Poisoning attacks against support vector machines. In J. Langford and J. Pineau, editors, 29th Int'l Conf. on Machine Learning. Omnipress, 2012.
-
(2012)
29th Int'l Conf. on Machine Learning
-
-
Biggio, B.1
Nelson, B.2
Laskov, P.3
-
9
-
-
84888997884
-
Is data clustering in adversarial settings secure
-
New York, NY, USA, ACM
-
B. Biggio, I. Pillai, S. R. Buló, D. Ariu, M. Pelillo, and F. Roli. Is data clustering in adversarial settings secure? In Proceedings of the 2013 ACM Workshop on Arti-cial Intelligence and Security, AISec '13, pages 87{98, New York, NY, USA, 2013. ACM.
-
(2013)
Proceedings of the 2013 ACM Workshop on Arti-cial Intelligence and Security AISec '13
, pp. 87-98
-
-
Biggio, B.1
Pillai, I.2
Buló, S.R.3
Ariu, D.4
Pelillo, M.5
Roli, F.6
-
10
-
-
84869200775
-
Static prediction games for adversarial learning problems
-
M. Brückner, C. Kanzow, and T. Scheffer. Static prediction games for adversarial learning problems. J. Mach. Learn. Res., 13:2617{2654, 2012.
-
(2012)
J. Mach. Learn. Res
, vol.13
, pp. 2617-2654
-
-
Brückner, M.1
Kanzow, C.2
Scheffer, T.3
-
11
-
-
84881398977
-
The fraunhofer aisec malware analysis laboratory
-
M. Brunner, M. Epah, H. Ho-nger, C. Roblee, P. Schoo, and S. Todt. The fraunhofer aisec malware analysis laboratory. Technical report, Fraunhofer Institute AISEC, 2010.
-
(2010)
Technical Report, Fraunhofer Institute AISEC
-
-
Brunner, M.1
Epah, M.2
Honger, H.3
Roblee, C.4
Schoo, P.5
Todt, S.6
-
12
-
-
85077703150
-
Polymorphic blending attacks
-
CA, USA, USENIX Association
-
P. Fogla, M. Sharif, R. Perdisci, O. Kolesnikov, and W. Lee. Polymorphic blending attacks. In USENIX-SS'06: Proceedings of the 15th conference on USENIX Security Symposium, Berkeley, CA, USA, 2006. USENIX Association.
-
(2006)
USENIX-SS'06: Proceedings of the 15th Conference on USENIX Security Symposium, Berkeley
-
-
Fogla, P.1
Sharif, M.2
Perdisci, R.3
Kolesnikov, O.4
Lee, W.5
-
16
-
-
84893321362
-
DUET: Integration of dynamic and static analyses for malware clustering with cluster ensembles
-
ACSAC
-
X. Hu and K. G. Shin. DUET: Integration of dynamic and static analyses for malware clustering with cluster ensembles. In Proc. of Annual Computer Security Applications Conference (ACSAC), 2013.
-
(2013)
Proc. of Annual Computer Security Applications Conference
-
-
Hu, X.1
Shin, K.G.2
-
17
-
-
80955143573
-
Adversarial machine learning
-
(AISec 2011), Chicago, IL, USA, October
-
L. Huang, A. D. Joseph, B. Nelson, B. Rubinstein, and J. D. Tygar. Adversarial machine learning. In 4th ACM Workshop on Artifficial Intelligence and Security (AISec 2011), pages 43{57, Chicago, IL, USA, October 2011.
-
(2011)
4th ACM Workshop on Artifficial Intelligence and Security
, pp. 43-57
-
-
Huang, L.1
Joseph, A.D.2
Nelson, B.3
Rubinstein, B.4
Tygar, J.D.5
-
18
-
-
84937688483
-
-
visited April
-
iSeclab. Anubis. http://anubis.iseclab.org, visited April, 2014.
-
(2014)
ISeclab. Anubis
-
-
-
19
-
-
84893405732
-
Data clustering: A review
-
Sept
-
A. K. Jain, M. N. Murty, and P. J. Flynn. Data clustering: A review. ACM Comput. Surv., 31(3):264{323, Sept. 1999.
-
(1999)
ACM Comput. Surv
, vol.31
, Issue.3
, pp. 264-323
-
-
Jain, A.K.1
Murty, M.N.2
Flynn, P.J.3
-
21
-
-
84967071046
-
-
Kaspersky Lab
-
Kaspersky Lab. KASPERSKY SECURITY BULLETIN 2013. http://media.kaspersky.com/pdf/KSB-2013-EN.pdf, 2014.
-
(2014)
KASPERSKY SECURITY BULLETIN 2013
-
-
-
23
-
-
84904807829
-
Feature weighting for improved classiffier robustness
-
(CEAS), Mountain View, CA, USA, 16/07/2009
-
A. Kolcz and C. H. Teo. Feature weighting for improved classiffier robustness. In Sixth Conference on Email and Anti-Spam (CEAS), Mountain View, CA, USA, 16/07/2009 2009.
-
(2009)
Sixth Conference on Email and Anti-Spam
-
-
Kolcz, A.1
Teo, C.H.2
-
24
-
-
84875216992
-
Scalable finegrained behavioral clustering of http-based malware
-
R. Perdisci, D. Ariu, and G. Giacinto. Scalable finegrained behavioral clustering of http-based malware. Computer Networks, 57(2):487 { 500, 2013.
-
(2013)
Computer Networks
, vol.57
, Issue.2
, pp. 487-500
-
-
Perdisci, R.1
Ariu, D.2
Giacinto, G.3
-
27
-
-
49949090311
-
Learning and classiffication of malware behavior
-
(DIMVA), July
-
K. Rieck, T. Holz, C. Willems, P. Düssel, and P. Laskov. Learning and classiffication of malware behavior. In Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA), pages 108{125, July 2008.
-
(2008)
Detection of Intrusions and Malware & Vulnerability Assessment
, pp. 108-125
-
-
Rieck, K.1
Holz, T.2
Willems, C.3
Düssel, P.4
Laskov, P.5
-
28
-
-
79958743806
-
Automatic analysis of malware behavior using machine learning
-
K. Rieck, P. Trinius, C. Willems, and T. Holz. Automatic analysis of malware behavior using machine learning. J. Comput. Secur., 19(4):639{668, 2011.
-
(2011)
J. Comput. Secur
, vol.19
, Issue.4
, pp. 639-668
-
-
Rieck, K.1
Trinius, P.2
Willems, C.3
Holz, T.4
-
29
-
-
84958984156
-
Undermining an anomaly-based intrusion detection system using common exploits
-
RAID
-
K. Tan, K. Killourhy, and R. Maxion. Undermining an anomaly-based intrusion detection system using common exploits. In Recent Adances in Intrusion Detection (RAID), pages 54{73, 2002.
-
(2002)
Recent Adances in Intrusion Detection
, pp. 54-73
-
-
Tan, K.1
Killourhy, K.2
Maxion, R.3
-
30
-
-
0036085540
-
Defining the operational limits of stide, an anomaly-based intrusion detector
-
Why 6
-
K. Tan and R. Maxion. \Why 6?" Defining the operational limits of stide, an anomaly-based intrusion detector. In Proc. of IEEE Symposium on Security and Privacy, pages 188{201, 2002.
-
(2002)
Proc. of IEEE Symposium on Security and Privacy
, pp. 188-201
-
-
Tan, K.1
Maxion, R.2
-
31
-
-
84855795320
-
A malware instruction set for behavior-based analysis
-
(Sicherheit, Schutz und Verlasslichkeit), Oct
-
P. Trinius, C. Willems, T. Holz, and K. Rieck. A malware instruction set for behavior-based analysis. In Proc. of GI Conference \Sicherheit" (Sicherheit, Schutz und Verlasslichkeit), pages 205{216, Oct. 2010.
-
(2010)
Proc. of GI Conference \Sicherheit
, pp. 205-216
-
-
Trinius, P.1
Willems, C.2
Holz, T.3
Rieck, K.4
-
33
-
-
84893332856
-
-
VirusTotal. https://www.virustotal.com.
-
VirusTotal
-
-
-
35
-
-
34047110218
-
CWSandbox: Towards automated dynamic binary analysis
-
C. Willems, T. Holz, and F. Freiling. CWSandbox: Towards automated dynamic binary analysis. IEEE Security and Privacy, 5(2):32{39, 2007.
-
(2007)
IEEE Security and Privacy
, vol.5
, Issue.2
, pp. 32-39
-
-
Willems, C.1
Holz, T.2
Freiling, F.3
|