-
2
-
-
84899704421
-
Novel active learning methods for enhanced {PC} malware detection in windows {OS}
-
Novel active learning methods for enhanced {PC} malware detection in windows {OS}. Expert Systems with Applications, 41(13):5843-5857, 2014.
-
(2014)
Expert Systems with Applications
, vol.41
, Issue.13
, pp. 5843-5857
-
-
-
3
-
-
84964863975
-
-
Duqu is back. http://www.kaspersky.com/about/news/virus/2015/Duqu-is-back, 2015.
-
(2015)
Duqu Is Back
-
-
-
4
-
-
84964900520
-
-
Mahotas features. http://mahotas.readthedocs.org/en/latest/features.html, 2015.
-
(2015)
Mahotas Features
-
-
-
5
-
-
84958542725
-
-
february
-
Mcafee labs threats report, february. http://www.mcafee.com/us/resources/reports/rp-quarterly-threat-q4-2014.pdf, 2015.
-
(2015)
Mcafee Labs Threats Report
-
-
-
6
-
-
84964799071
-
-
may.
-
Symantec intelligent report, may. https://www.symantec.com/content/en/us/enterprise/other-resources/intelligence-report-05-2015.en-us.pdf, 2015.
-
(2015)
Symantec Intelligent Report
-
-
-
7
-
-
84964806978
-
-
Top maliciously used apis. https://www.bnxnet.com/top-maliciously-used-apis/, 2015.
-
(2015)
Top Maliciously Used Apis
-
-
-
8
-
-
84964799339
-
-
Xgboost. https://github.com/dmlc/xgboost, 2015.
-
(2015)
Xgboost
-
-
-
9
-
-
84882639451
-
Malware detection by behavioural sequential patterns
-
M. Ahmadi, A. Sami, H. Rahimi, and B. Yadegari. Malware detection by behavioural sequential patterns. Computer Fraud & Security, 2013(8):11-19, 2013.
-
(2013)
Computer Fraud & Security
, vol.2013
, Issue.8
, pp. 11-19
-
-
Ahmadi, M.1
Sami, A.2
Rahimi, H.3
Yadegari, B.4
-
10
-
-
84893000796
-
Structural entropy and metamorphic malware
-
D. Baysa, R. Low, and M. Stamp. Structural entropy and metamorphic malware. Journal of Computer Virology and Hacking Techniques, 9(4):179-192, 2013.
-
(2013)
Journal of Computer Virology and Hacking Techniques
, vol.9
, Issue.4
, pp. 179-192
-
-
Baysa, D.1
Low, R.2
Stamp, M.3
-
11
-
-
84886493283
-
Evasion attacks against Machine learning at test time
-
H. Blockeel, K. Kersting, S. Nijssen, and F. ÅeleznÃ, editors Springer Berlin Heidelberg
-
B. Biggio, I. Corona, D. Maiorca, B. Nelson, N. ÅǍrndiaǧ, P. Laskov, G. Giacinto, and F. Roli. Evasion attacks against machine learning at test time. In H. Blockeel, K. Kersting, S. Nijssen, and F. ÅeleznÃ, editors, Machine Learning and Knowledge Discovery in Databases, Volume 8190 of Lecture Notes in Computer Science, pages 387-402. Springer Berlin Heidelberg, 2013.
-
(2013)
Machine Learning and Knowledge Discovery in Databases, Volume 8190 of Lecture Notes in Computer Science
, pp. 387-402
-
-
Biggio, B.1
Corona, I.2
Maiorca, D.3
Nelson, B.4
ÅǍrndiaǧ, N.5
Laskov, P.6
Giacinto, G.7
Roli, F.8
-
13
-
-
84937712787
-
Poisoning behavioral malware clustering
-
New York, NY, USA ACM
-
B. Biggio, K. Rieck, D. Ariu, C. Wressnegger, I. Corona, G. Giacinto, and F. Roli. Poisoning behavioral malware clustering. In Proceedings of the 2014 Workshop on Artificial Intelligent and Security Workshop, AISec '14, pages 27-36, New York, NY, USA, 2014. ACM.
-
(2014)
Proceedings of the 2014 Workshop on Artificial Intelligent and Security Workshop, AISec '14
, pp. 27-36
-
-
Biggio, B.1
Rieck, K.2
Ariu, D.3
Wressnegger, C.4
Corona, I.5
Giacinto, G.6
Roli, F.7
-
14
-
-
67349273367
-
Statistical structures: Fingerprinting malware for classification and analysis
-
D. Bilar. Statistical structures: Fingerprinting malware for classification and analysis. In Blackhat, 2006.
-
(2006)
Blackhat
-
-
Bilar, D.1
-
15
-
-
0030211964
-
Bagging predictors
-
Aug.
-
L. Breiman. Bagging predictors. Mach. Learn., 24(2):123-140, Aug. 1996.
-
(1996)
Mach. Learn.
, vol.24
, Issue.2
, pp. 123-140
-
-
Breiman, L.1
-
16
-
-
0003802343
-
Classification and regression trees
-
CA new edition [?]?
-
L. Breiman, J. Friedman, R. Olshen, and C. Stone. Classification and Regression Trees. Wadsworth and Brooks, Monterey, CA, 1984. new edition [?]?
-
(1984)
Wadsworth and Brooks, Monterey
-
-
Breiman, L.1
Friedman, J.2
Olshen, R.3
Stone, C.4
-
17
-
-
84924223669
-
Static analysis of executables to detect Malicious patterns
-
SSYM'03 Berkeley, CA, USA, 2003. USENIX Association
-
M. Christodorescu and S. Jha. Static analysis of executables to detect malicious patterns. In Proceedings of the 12th Conference on USENIX Security Symposium - Volume 12, SSYM'03, pages 12-12, Berkeley, CA, USA, 2003. USENIX Association.
-
Proceedings of the 12th Conference on USENIX Security Symposium
, vol.12
, pp. 12
-
-
Christodorescu, M.1
Jha, S.2
-
18
-
-
27544433210
-
Semantics-aware malware detection
-
May
-
M. Christodorescu, S. Jha, S. Seshia, D. Song, and R. Bryant. Semantics-aware malware detection. In Security and Privacy, 2005 IEEE Symposium on, pages 32-46, May 2005.
-
(2005)
Security and Privacy, 2005 IEEE Symposium On
, pp. 32-46
-
-
Christodorescu, M.1
Jha, S.2
Seshia, S.3
Song, D.4
Bryant, R.5
-
19
-
-
84919773193
-
Do we need hundreds of classifiers to solve real world classification problems?
-
Jan.
-
M. Fernández-Delgado, E. Cernadas, S. Barro, and D. Amorim. Do we need hundreds of classifiers to solve real world classification problems? J. Mach. Learn. Res., 15(1):3133-3181, Jan. 2014.
-
(2014)
J. Mach. Learn. Res.
, vol.15
, Issue.1
, pp. 3133-3181
-
-
Fernández-Delgado, M.1
Cernadas, E.2
Barro, S.3
Amorim, D.4
-
20
-
-
77955210614
-
Synthesizing near-optimal malware specifications from suspicious behaviors
-
Washington, DC, USA, 2010. IEEE Computer Society
-
M. Fredrikson, S. Jha, M. Christodorescu, R. Sailer, and X. Yan. Synthesizing near-optimal malware specifications from suspicious behaviors. In Proceedings of the 2010 IEEE Symposium on Security and Privacy, SP '10, pages 45-60, Washington, DC, USA, 2010. IEEE Computer Society.
-
Proceedings of the 2010 IEEE Symposium on Security and Privacy, SP '10
, pp. 45-60
-
-
Fredrikson, M.1
Jha, S.2
Christodorescu, M.3
Sailer, R.4
Yan, X.5
-
22
-
-
76649141154
-
Automatic generation of string signatures for malware detection
-
Berlin, Heidelberg, 2009. Springer-Verlag
-
K. Griffin, S. Schneider, X. Hu, and T.-C. Chiueh. Automatic generation of string signatures for malware detection. In Proceedings of the 12th International Symposium on Recent Advances in Intrusion Detection, RAID '09, pages 101-120, Berlin, Heidelberg, 2009. Springer-Verlag.
-
Proceedings of the 12th International Symposium on Recent Advances in Intrusion Detection, RAID '09
, pp. 101-120
-
-
Griffin, K.1
Schneider, S.2
Hu, X.3
Chiueh, T.-C.4
-
23
-
-
74049142314
-
Large-scale malware indexing using function-call graphs
-
CCS '09 New York, NY, USA ACM
-
X. Hu, T.-c. Chiueh, and K. G. Shin. Large-scale malware indexing using function-call graphs. In Proceedings of the 16th ACM Conference on Computer and Communications Security, CCS '09, pages 611-620, New York, NY, USA, 2009. ACM.
-
(2009)
Proceedings of the 16th ACM Conference on Computer and Communications Security
, pp. 611-620
-
-
Hu, X.1
Chiueh, T.-C.2
Shin, K.G.3
-
24
-
-
84875646366
-
A static, packer-agnostic filter to detect similar malware samples
-
DIMVA'12 Berlin, Heidelberg Springer-Verlag
-
G. Jacob, P. M. Comparetti, M. Neugschwandtner, C. Kruegel, and G. Vigna. A static, packer-agnostic filter to detect similar malware samples. In Proceedings of the 9th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA'12, pages 102-122, Berlin, Heidelberg, 2013. Springer-Verlag.
-
(2013)
Proceedings of the 9th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment
, pp. 102-122
-
-
Jacob, G.1
Comparetti, P.M.2
Neugschwandtner, M.3
Kruegel, C.4
Vigna, G.5
-
25
-
-
84893874008
-
-
R. Springer Publishing Company, Incorporated
-
G. James, D. Witten, T. Hastie, and R. Tibshirani. An Introduction to Statistical Learning: With Application. In R. Springer Publishing Company, Incorporated, 2014.
-
(2014)
An Introduction to Statistical Learning: With Application
-
-
James, G.1
Witten, D.2
Hastie, T.3
Tibshirani, R.4
-
27
-
-
85076206522
-
Effective and efficient malware detection at the end host
-
SSYM'09 Berkeley, CA, USA USENIX Association
-
C. Kolbitsch, P. M. Comparetti, C. Kruegel, E. Kirda, X. Zhou, and X. Wang. Effective and efficient malware detection at the end host. In Proceedings of the 18th Conference on USENIX Security Symposium, SSYM'09, pages 351-366, Berkeley, CA, USA, 2009. USENIX Association.
-
(2009)
Proceedings of the 18th Conference on USENIX Security Symposium
, pp. 351-366
-
-
Kolbitsch, C.1
Comparetti, P.M.2
Kruegel, C.3
Kirda, E.4
Zhou, X.5
Wang, X.6
-
28
-
-
85077528077
-
Automating mimicry attacks using static binary analysis
-
SSYM'05 Berkeley, CA, USA USENIX Association
-
C. Kruegel, E. Kirda, D. Mutz, W. Robertson, and G. Vigna. Automating mimicry attacks using static binary analysis. In Proceedings of the 14th Conference on USENIX Security Symposium - Volume 14, SSYM'05, pages 11-11, Berkeley, CA, USA, 2005. USENIX Association.
-
(2005)
Proceedings of the 14th Conference on USENIX Security Symposium
, vol.14
, pp. 11
-
-
Kruegel, C.1
Kirda, E.2
Mutz, D.3
Robertson, W.4
Vigna, G.5
-
29
-
-
84866850766
-
-
John Wiley & Sons, Inc.
-
L. I. Kuncheva. Ensemble Methods, pages 186-229. John Wiley & Sons, Inc., 2014.
-
(2014)
Ensemble Methods
, pp. 186-229
-
-
Kuncheva, L.I.1
-
30
-
-
78650024495
-
Accessminer: Using system-centric models for malware protection
-
CCS '10 New York, NY, USA ACM
-
A. Lanzi, D. Balzarotti, C. Kruegel, M. Christodorescu, and E. Kirda. Accessminer: Using system-centric models for malware protection. In Proceedings of the 17th ACM Conference on Computer and Communications Security, CCS '10, pages 399-412, New York, NY, USA, 2010. ACM.
-
(2010)
Proceedings of the 17th ACM Conference on Computer and Communications Security
, pp. 399-412
-
-
Lanzi, A.1
Balzarotti, D.2
Kruegel, C.3
Christodorescu, M.4
Kirda, E.5
-
31
-
-
34047129159
-
Using entropy analysis to find encrypted and packed malware
-
Mar.
-
R. Lyda and J. Hamrock. Using entropy analysis to find encrypted and packed malware. IEEE Security and Privacy, 5(2):40-45, Mar. 2007.
-
(2007)
IEEE Security and Privacy
, vol.5
, Issue.2
, pp. 40-45
-
-
Lyda, R.1
Hamrock, J.2
-
32
-
-
34548737161
-
Exploring multiple execution paths for malware analysis
-
SP '07 Washington, DC, USA IEEE Computer Society
-
A. Moser, C. Kruegel, and E. Kirda. Exploring multiple execution paths for malware analysis. In Proceedings of the 2007 IEEE Symposium on Security and Privacy, SP '07, pages 231-245, Washington, DC, USA, 2007. IEEE Computer Society.
-
(2007)
Proceedings of the 2007 IEEE Symposium on Security and Privacy
, pp. 231-245
-
-
Moser, A.1
Kruegel, C.2
Kirda, E.3
-
33
-
-
48649087530
-
Limits of static analysis for malware detection
-
ACSAC 2007. Twenty-Third Annual Dec
-
A. Moser, C. Kruegel, and E. Kirda. Limits of static analysis for malware detection. In Computer Security Applications Conference, 2007. ACSAC 2007. Twenty-Third Annual, pages 421-430, Dec 2007.
-
(2007)
Computer Security Applications Conference, 2007
, pp. 421-430
-
-
Moser, A.1
Kruegel, C.2
Kirda, E.3
-
34
-
-
84928243451
-
Dllminer: Structural mining for malware detection
-
M. Narouei, MansourAhmadi, G. Giacinto, H. Takabi, and A. Sami. Dllminer: Structural mining for malware detection. Security and Communication Networks, 2015.
-
(2015)
Security and Communication Networks
-
-
Narouei, M.1
Ahmadi, M.2
Giacinto, G.3
Takabi, H.4
Sami, A.5
-
35
-
-
84867947012
-
Malware images: Visualization and automatic classification
-
VizSec '11 New York, NY, USA ACM
-
L. Nataraj, S. Karthikeyan, G. Jacob, and B. S. Manjunath. Malware images: Visualization and automatic classification. In Proceedings of the 8th International Symposium on Visualization for Cyber Security, VizSec '11, pages 4:1-4:7, New York, NY, USA, 2011. ACM.
-
(2011)
Proceedings of the 8th International Symposium on Visualization for Cyber Security
, pp. 41-47
-
-
Nataraj, L.1
Karthikeyan, S.2
Jacob, G.3
Manjunath, B.S.4
-
36
-
-
84980365546
-
A framework for understanding dynamic anti-analysis defenses
-
PPREW-4 New York, NY, USA ACM
-
J. Qiu, B. Yadegari, B. Johannesmeyer, S. Debray, and X. Su. A framework for understanding dynamic anti-analysis defenses. In Proceedings of the 4th Program Protection and Reverse Engineering Workshop, PPREW-4, pages 2:1-2:9, New York, NY, USA, 2014. ACM.
-
(2014)
Proceedings of the 4th Program Protection and Reverse Engineering Workshop
, pp. 21-29
-
-
Qiu, J.1
Yadegari, B.2
Johannesmeyer, B.3
Debray, S.4
Su, X.5
-
37
-
-
49949090311
-
Learning and classification of malware behavior
-
DIMVA '08 Berlin, Heidelberg Springer-Verlag
-
K. Rieck, T. Holz, C. Willems, P. Dussel, and P. Laskov. Learning and classification of malware behavior. In Proceedings of the 5th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA '08, pages 108-125, Berlin, Heidelberg, 2008. Springer-Verlag.
-
(2008)
Proceedings of the 5th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment
, pp. 108-125
-
-
Rieck, K.1
Holz, T.2
Willems, C.3
Dussel, P.4
Laskov, P.5
-
38
-
-
84878363750
-
Prudent practices for designing malware experiments: Status quo and outlook
-
May
-
C. Rossow, C. Dietrich, C. Grier, C. Kreibich, V. Paxson, N. Pohlmann, H. Bos, and M. van Steen. Prudent practices for designing malware experiments: Status quo and outlook. In Security and Privacy (SP), 2012 IEEE Symposium on, pages 65-79, May 2012.
-
(2012)
Security and Privacy (SP), 2012 IEEE Symposium On
, pp. 65-79
-
-
Rossow, C.1
Dietrich, C.2
Grier, C.3
Kreibich, C.4
Paxson, V.5
Pohlmann, N.6
Bos, H.7
Van Steen, M.8
-
39
-
-
77954707625
-
Malware detection based on mining api calls
-
SAC '10 New York, NY, USA ACM
-
A. Sami, B. Yadegari, H. Rahimi, N. Peiravian, S. Hashemi, and A. Hamze. Malware detection based on mining api calls. In Proceedings of the 2010 ACM Symposium on Applied Computing, SAC '10, pages 1020-1025, New York, NY, USA, 2010. ACM.
-
(2010)
Proceedings of the 2010 ACM Symposium on Applied Computing
, pp. 1020-1025
-
-
Sami, A.1
Yadegari, B.2
Rahimi, H.3
Peiravian, N.4
Hashemi, S.5
Hamze, A.6
-
40
-
-
84874105145
-
Opcode sequences as representation of executables for data-mining-based unknown malware detection
-
Data Mining for Information Security
-
I. Santos, F. Brezo, X. Ugarte-Pedrero, and P. G. Bringas. Opcode sequences as representation of executables for data-mining-based unknown malware detection. Information Sciences, 231(0):64-82, 2013. Data Mining for Information Security.
-
(2013)
Information Sciences
, vol.231
, pp. 64-82
-
-
Santos, I.1
Brezo, F.2
Ugarte-Pedrero, X.3
Bringas, P.G.4
-
41
-
-
79958700553
-
Disassembly of executable code revisited
-
WCRE '02 Washington, DC, USA IEEE Computer Society
-
B. Schwarz, S. Debray, and G. Andrews. Disassembly of executable code revisited. In Proceedings of the Ninth Working Conference on Reverse Engineering (WCRE'02), WCRE '02, pages 45-, Washington, DC, USA, 2002. IEEE Computer Society.
-
(2002)
Proceedings of the Ninth Working Conference on Reverse Engineering (WCRE'02)
, pp. 45
-
-
Schwarz, B.1
Debray, S.2
Andrews, G.3
-
42
-
-
76649143365
-
Pe-miner: Mining structural information to detect Malicious executables in realtime
-
E. Kirda, S. Jha, and D. Balzarotti, editors Springer Berlin Heidelberg
-
M. Shafiq, S. Tabish, F. Mirza, and M. Farooq. Pe-miner: Mining structural information to detect malicious executables in realtime. In E. Kirda, S. Jha, and D. Balzarotti, editors, Recent Advances in Intrusion Detection, Volume 5758 of Lecture Notes in Computer Science, pages 121-141. Springer Berlin Heidelberg, 2009.
-
(2009)
Recent Advances in Intrusion Detection, Volume 5758 of Lecture Notes in Computer Science
, pp. 121-141
-
-
Shafiq, M.1
Tabish, S.2
Mirza, F.3
Farooq, M.4
-
43
-
-
21644475665
-
Static analyzer of vicious executables (save)
-
ACSAC '04 Washington, DC, USA IEEE Computer Society
-
A. H. Sung, J. Xu, P. Chavez, and S. Mukkamala. Static analyzer of vicious executables (save). In Proceedings of the 20th Annual Computer Security Applications Conference, ACSAC '04, pages 326-334, Washington, DC, USA, 2004. IEEE Computer Society.
-
(2004)
Proceedings of the 20th Annual Computer Security Applications Conference
, pp. 326-334
-
-
Sung, A.H.1
Xu, J.2
Chavez, P.3
Mukkamala, S.4
-
44
-
-
70449633109
-
Malware detection using statistical analysis of byte-level file content
-
CSI-KDD '09 New York, NY, USA ACM
-
S. M. Tabish, M. Z. Shafiq, and M. Farooq. Malware detection using statistical analysis of byte-level file content. In Proceedings of the ACM SIGKDD Workshop on CyberSecurity and Intelligence Informatics, CSI-KDD '09, pages 23-31, New York, NY, USA, 2009. ACM.
-
(2009)
Proceedings of the ACM SIGKDD Workshop on CyberSecurity and Intelligence Informatics
, pp. 23-31
-
-
Tabish, S.M.1
Shafiq, M.Z.2
Farooq, M.3
-
45
-
-
34047110218
-
Toward automated dynamic malware analysis using cwsandbox
-
IEEE March
-
C. Willems, T. Holz, and F. Freiling. Toward automated dynamic malware analysis using cwsandbox. Security Privacy, IEEE, 5(2):32-39, March 2007.
-
(2007)
Security Privacy
, vol.5
, Issue.2
, pp. 32-39
-
-
Willems, C.1
Holz, T.2
Freiling, F.3
-
46
-
-
84984905603
-
Malware detection with quantitative data flow graphs
-
ASIA CCS '14 New York, NY, USA ACM
-
T. Wüchner, M. Ochoa, and A. Pretschner. Malware detection with quantitative data flow graphs. In Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, ASIA CCS '14, pages 271-282, New York, NY, USA, 2014. ACM.
-
(2014)
Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security
, pp. 271-282
-
-
Wüchner, T.1
Ochoa, M.2
Pretschner, A.3
-
48
-
-
54849412646
-
An intelligent pe-malware detection system based on association mining
-
Y. Ye, D. Wang, T. Li, D. Ye, and Q. Jiang. An intelligent pe-malware detection system based on association mining. Journal in Computer Virology, 4(4):323-334, 2008.
-
(2008)
Journal in Computer Virology
, vol.4
, Issue.4
, pp. 323-334
-
-
Ye, Y.1
Wang, D.2
Li, T.3
Ye, D.4
Jiang, Q.5
|