-
1
-
-
79956336732
-
SplitScreen: Enabling efficient, distributed malware detection
-
S. K. Cha, I. Moraru, J. Jang, J. Truelove, D. Brumley, and D. G. Andersen, "SplitScreen: Enabling efficient, distributed malware detection, " Commun. Netw. J. Of, vol. 13, no. 2, pp. 187-200, 2011.
-
(2011)
Commun. Netw. J. of
, vol.13
, Issue.2
, pp. 187-200
-
-
Cha, S.K.1
Moraru, I.2
Jang, J.3
Truelove, J.4
Brumley, D.5
Andersen, D.G.6
-
3
-
-
79952079915
-
-
blogs@Cisco-Cisco Blogs. [Accessed: 05-Aug-2014]
-
"A Brief History of Malware Obfuscation: Part 1 of 2, " blogs@Cisco-Cisco Blogs. [Online]. Available: http: //blogs. cisco. com/security/a-brief-history-of-malware-obfuscati on-part-1-of-2/. [Accessed: 05-Aug-2014].
-
A Brief History of Malware Obfuscation: Part 1 of 2
-
-
-
6
-
-
84988942969
-
-
Sky News. Sky News, 06-May-2014. [Accessed: 07-Jul-2015]
-
Sky News, "Antivirus Is 'Dead' Says Norton Software Boss, " Sky News, 06-May-2014. [Online]. Available: http: //news. sky. com/story/1256251/antivirus-is-dead-says-nortonsoftware-boss. [Accessed: 07-Jul-2015].
-
Antivirus is Dead' Says Norton Software Boss
-
-
-
7
-
-
53349116756
-
Towards an understanding of anti-virtualization and anti-debugging behavior in modern malware
-
X. Chen, J. Andersen, Z. M. Mao, M. Bailey, and J. Nazario, "Towards an understanding of anti-virtualization and anti-debugging behavior in modern malware, " in IEEE International Conference on Dependable Systems and Networks with FTCS and DCC, 2008. DSN 2008, 2008, pp. 177-186.
-
(2008)
IEEE International Conference on Dependable Systems and Networks with FTCS and DCC, 2008. DSN 2008
, pp. 177-186
-
-
Chen, X.1
Andersen, J.2
Mao, Z.M.3
Bailey, M.4
Nazario, J.5
-
9
-
-
33746406796
-
Detecting self-mutating malware using control-flow graph matching
-
D. Bruschi, M. Lorenzo, and M. Monga, "Detecting self-mutating malware using control-flow graph matching, " in Detection of Intrusions and Malware & Vulnerability Assessment, vol. 4064, 2006, pp. 129-143.
-
(2006)
Detection of Intrusions and Malware & Vulnerability Assessment
, vol.4064
, pp. 129-143
-
-
Bruschi, D.1
Lorenzo, M.2
Monga, M.3
-
11
-
-
23744485744
-
Testing malware detectors
-
New York, NY, USA
-
M. Christodorescu and S. Jha, "Testing Malware Detectors, " in Proceedings of the 2004 ACM SIGSOFT International Symposium on Software Testing and Analysis, New York, NY, USA, 2004, pp. 34-44.
-
(2004)
Proceedings of the 2004 ACM SIGSOFT International Symposium on Software Testing and Analysis
, pp. 34-44
-
-
Christodorescu, M.1
Jha, S.2
-
16
-
-
84988911854
-
-
FireEye, 17-Sep-2013. [Accessed: 31-Oct-2015]
-
D. Wilson, "The History of OpenIOC " Threat Research, " FireEye, 17-Sep-2013. [Online]. Available: https: //www. fireeye. com/blog/threatresearch/ 2013/09/history-openioc. html. [Accessed: 31-Oct-2015].
-
The History of OpenIOC " Threat Research
-
-
Wilson, D.1
-
17
-
-
84988960889
-
-
Speaking of Security-The RSA Blog and Podcast. [Accessed: 16-Nov-2014]
-
"Understanding Indicators of Compromise (IOC) Part I, " Speaking of Security-The RSA Blog and Podcast. [Online]. Available: https: //blogs. rsa. com/understanding-indicators-of-compromise-iocpart-i/. [Accessed: 16-Nov-2014].
-
Understanding Indicators of Compromise (IOC) Part i
-
-
|