-
3
-
-
48349087890
-
Code obfuscation techniques for metamorphic viruses
-
J.-M. Borello and L. Me. Code obfuscation techniques for metamorphic viruses. Journal in Computer Virology, pages 211-220, 2008.
-
(2008)
Journal in Computer Virology
, pp. 211-220
-
-
Borello, J.-M.1
Me, L.2
-
5
-
-
27544433210
-
Semantics-aware malware detection
-
M. Christodorescu, S. Jha, S. Seshia, D. Song, and R. Bryant. Semantics-Aware Malware Detection. 2005 IEEE Symposium on Security and Privacy (S&P'05), pages 32-46, 2005.
-
(2005)
2005 IEEE Symposium on Security and Privacy (S&P'05
, pp. 32-46
-
-
Christodorescu, M.1
Jha, S.2
Seshia, S.3
Song, D.4
Bryant, R.5
-
6
-
-
84881102082
-
A semantic approach to host-based intrusion detection systems using contiguous and discontiguous system call patterns
-
G. Creech and J. Hu. A semantic approach to host-based intrusion detection systems using contiguous and discontiguous system call patterns. Computers, IEEE Transactions on, pages 1-1, 2013.
-
(2013)
Computers, IEEE Transactions on
, pp. 1
-
-
Creech, G.1
Hu, J.2
-
7
-
-
84858392040
-
A survey on automated dynamic malware-analysis techniques and tools
-
M. Egele, T. Scholte, E. Kirda, and C. Kruegel. A survey on automated dynamic malware-analysis techniques and tools. ACM Computing Surveys (CSUR), page 6, 2012.
-
(2012)
ACM Computing Surveys (CSUR
, pp. 6
-
-
Egele, M.1
Scholte, T.2
Kirda, E.3
Kruegel, C.4
-
9
-
-
0029716418
-
A sense of self for Unix processes
-
S. Forrest, S. Hofmeyr, a. Somayaji, and T. Longstaff. A sense of self for Unix processes. Proceedings of Symposium on Security and Privacy, pages 120-128, 1996.
-
(1996)
Proceedings of Symposium on Security and Privacy
, pp. 120-128
-
-
Forrest, S.1
Hofmeyr, S.2
Somayaji, A.3
Longstaff, T.4
-
11
-
-
80051684605
-
Dynamic behavior matching: A complexity analysis and new approximation algorithms
-
M. Fredrikson, M. Christodorescu, and S. Jha. Dynamic behavior matching: A complexity analysis and new approximation algorithms. Automated Deduction-CADE-23, pages 252-267, 2011.
-
(2011)
Automated Deduction-CADE-23
, pp. 252-267
-
-
Fredrikson, M.1
Christodorescu, M.2
Jha, S.3
-
12
-
-
77955210614
-
Synthesizing near-optimal malware specifications from suspicious behaviors
-
M. Fredrikson, S. Jha, M. Christodorescu, R. Sailer, and X. Yan. Synthesizing Near-Optimal Malware Specifications from Suspicious Behaviors. 2010 IEEE Symposium on Security and Privacy, pages 45-60, 2010.
-
(2010)
2010 IEEE Symposium on Security and Privacy
, pp. 45-60
-
-
Fredrikson, M.1
Jha, S.2
Christodorescu, M.3
Sailer, R.4
Yan, X.5
-
15
-
-
85077680022
-
Behavior-based spyware detection
-
E. Kirda, C. Kruegel, G. Banks, G. Vigna, and R. A. Kemmerer. Behavior-based spyware detection. In Proceedings of the 15th Conference on USENIX Security Symposium, 2006.
-
(2006)
Proceedings of the 15th Conference on USENIX Security Symposium
-
-
Kirda, E.1
Kruegel, C.2
Banks, G.3
Vigna, G.4
Kemmerer, R.A.5
-
16
-
-
85076206522
-
Effective and efficient malware detection at the end host
-
C. Kolbitsch and P. Comparetti. Effective and Efficient Malware Detection at the End Host. USENIX, 2009.
-
(2009)
USENIX
-
-
Kolbitsch, C.1
Comparetti, P.2
-
17
-
-
78650024495
-
Accessminer: Using system-centric models for malware protection
-
A. Lanzi, D. Balzarotti, C. Kruegel, M. Christodorescu, and E. Kirda. Accessminer: Using system-centric models for malware protection. In Proceedings of the 17th ACM Conference on Computer and Communications Security, pages 399-412, 2010.
-
(2010)
Proceedings of the 17th ACM Conference on Computer and Communications Security
, pp. 399-412
-
-
Lanzi, A.1
Balzarotti, D.2
Kruegel, C.3
Christodorescu, M.4
Kirda, E.5
-
23
-
-
33846554869
-
A semantics-based approach to malware detection
-
M. Preda, M. Christodorescu, S. Jha, and S. Debray. A semantics-based approach to malware detection. ACM SIGPLAN Notices, pages 1-12, 2007.
-
(2007)
ACM SIGPLAN Notices
, pp. 1-12
-
-
Preda, M.1
Christodorescu, M.2
Jha, S.3
Debray, S.4
-
25
-
-
79958743806
-
Automatic analysis of malware behavior using machine learning
-
K. Rieck, P. Trinius, C. Willems, and T. Holz. Automatic analysis of malware behavior using machine learning. Journal of Computer Security, pages 639-668, 2011.
-
(2011)
Journal of Computer Security
, pp. 639-668
-
-
Rieck, K.1
Trinius, P.2
Willems, C.3
Holz, T.4
-
27
-
-
85156147536
-
Impeding malware analysis using conditional code obfuscation
-
M. I. Sharif, A. Lanzi, J. T. Giffin, and W. Lee. Impeding malware analysis using conditional code obfuscation. In NDSS, 2008.
-
(2008)
NDSS
-
-
Sharif, M.I.1
Lanzi, A.2
Giffin, J.T.3
Lee, W.4
-
30
-
-
84889045953
-
A close look on n-grams in intrusion detection: Anomaly detection vs classification
-
C. Wressnegger, G. Schwenk, D. Arp, and K. Rieck. A close look on n-grams in intrusion detection: anomaly detection vs. classification. In Proceedings of the 2013 ACM workshop on Artificial intelligence and security, pages 67-76, 2013.
-
(2013)
Proceedings of the 2013 ACM Workshop on Artificial Intelligence and Security
, pp. 67-76
-
-
Wressnegger, C.1
Schwenk, G.2
Arp, D.3
Rieck, K.4
-
32
-
-
77950788046
-
Panorama: Capturing system-wide information flow for malware detection and analysis
-
H. Yin, D. Song, M. Egele, C. Kruegel, and E. Kirda. Panorama: Capturing system-wide information flow for malware detection and analysis. In Proceedings of the 14th ACM Conference on Computer and Communications Security, pages 116-127, 2007.
-
(2007)
Proceedings of the 14th ACM Conference on Computer and Communications Security
, pp. 116-127
-
-
Yin, H.1
Song, D.2
Egele, M.3
Kruegel, C.4
Kirda, E.5
-
33
-
-
79952099736
-
Malware obfuscation techniques: A brief survey. in Broadband, Wireless Computing, Communication and Applications (BWCCA)
-
I. You and K. Yim. Malware obfuscation techniques: A brief survey. In Broadband, Wireless Computing, Communication and Applications (BWCCA), 2010 International Conference on, pages 297-300, 2010.
-
(2010)
2010 International Conference on
, pp. 297-300
-
-
You, I.1
Yim, K.2
|