-
1
-
-
85180627949
-
-
at
-
ANUBIS. http://anubis.seclab.tuwien.ac. at, 2008.
-
(2008)
-
-
-
3
-
-
85180632251
-
-
CWSandbox. http://www.cwsandbox.org/, 2008.
-
(2008)
CWSandbox
-
-
-
5
-
-
85180623139
-
-
MWCollect. http://www.mwcollect.org/, 2008.
-
(2008)
MWCollect
-
-
-
6
-
-
85180623675
-
-
Norman Sandbox. http://www.norman.com/microsites/nsic/, 2008.
-
(2008)
Norman Sandbox
-
-
-
7
-
-
85180636038
-
-
Shadowserver. http://shadowserver.org/wiki/, 2008.
-
(2008)
-
-
-
8
-
-
85180633631
-
-
ThreatExpert. http://www.threatexpert.com/, 2008.
-
(2008)
ThreatExpert
-
-
-
9
-
-
84867731767
-
-
Virus Total. http://www.virustotal.com/, 2008.
-
(2008)
Virus Total
-
-
-
10
-
-
33748060966
-
How slow is the k-means method?
-
New York, NY, USA, ACM
-
D. Arthur and S. Vassilvitskii. How slow is the k-means method? In SCG’06: Proceedings of the twenty-second annual symposium on Computational geometry, pages 144–153, New York, NY, USA, 2006. ACM.
-
(2006)
SCG’06: Proceedings of the twenty-second annual symposium on Computational geometry
, pp. 144-153
-
-
Arthur, D.1
Vassilvitskii, S.2
-
11
-
-
33750376598
-
The nepenthes platform: An efficient approach to collect malware
-
D. Zamboni and C. Kruegel, editors, pages Springer
-
P. Baecher, M. Koetter, T. Holz, M. Dornseif, and F. C. Freiling. The nepenthes platform: An efficient approach to collect malware. In D. Zamboni and C. Kruegel, editors, RAID, volume 4219 of Lecture Notes in Computer Science, pages 165–184. Springer, 2006.
-
(2006)
RAID, volume 4219 of Lecture Notes in Computer Science
, pp. 165-184
-
-
Baecher, P.1
Koetter, M.2
Holz, T.3
Dornseif, M.4
Freiling, F. C.5
-
13
-
-
58149084148
-
Automated classification and analysis of internet malware
-
September
-
M. Bailey, J. Oberheide, J. Andersen, Z. M. Mao, F. Jahanian, and J. Nazario. Automated classification and analysis of internet malware. In Proceedings of the 10th International Symposium on Recent Advances in Intrusion Detection (RAID’07), September 2007.
-
(2007)
Proceedings of the 10th International Symposium on Recent Advances in Intrusion Detection (RAID’07)
-
-
Bailey, M.1
Oberheide, J.2
Andersen, J.3
Mao, Z. M.4
Jahanian, F.5
Nazario, J.6
-
16
-
-
0010362121
-
Syntactic clustering of the web
-
A. Z. Broder, S. C. Glassman, M. S. Manasse, and G. Zweig. Syntactic clustering of the web. Comput. Netw. ISDN Syst., 29(8-13):1157–1166, 1997.
-
(1997)
Comput. Netw. ISDN Syst
, vol.29
, Issue.8-13
, pp. 1157-1166
-
-
Broder, A. Z.1
Glassman, S. C.2
Manasse, M. S.3
Zweig, G.4
-
17
-
-
78650021383
-
Automatically identifying trigger-based behavior in malware
-
Editors Wenke Lee et. al
-
D. Brumley, C. Hartwig, Z. Liang, J. Newsome, P. Poosankam, D. Song, and H. Yin. Automatically identifying trigger-based behavior in malware. In Book chapter in”Botnet Analysis and Defense”, Editors Wenke Lee et. al., 2007.
-
(2007)
Book chapter in”Botnet Analysis and Defense
-
-
Brumley, D.1
Hartwig, C.2
Liang, Z.3
Newsome, J.4
Poosankam, P.5
Song, D.6
Yin, H.7
-
21
-
-
37849017546
-
Mining specifications of malicious behavior
-
New York, NY, USA, ACM
-
M. Christodorescu, S. Jha, and C. Kruegel. Mining specifications of malicious behavior. In ESEC-FSE’07: Proceedings of the the 6th joint meeting of the European software engineering conference and the ACM SIGSOFT symposium on The foundations of software engineering, pages 5–14, New York, NY, USA, 2007. ACM.
-
(2007)
ESEC-FSE’07: Proceedings of the the 6th joint meeting of the European software engineering conference and the ACM SIGSOFT symposium on The foundations of software engineering
, pp. 5-14
-
-
Christodorescu, M.1
Jha, S.2
Kruegel, C.3
-
25
-
-
84903607772
-
Dynamic spyware analysis
-
June
-
M. Egele, C. Kruegel, E. Kirda, H. Yin, and D. Song. Dynamic spyware analysis. In Proceedings of USENIX Annual Technical Conference, June 2007.
-
(2007)
Proceedings of USENIX Annual Technical Conference
-
-
Egele, M.1
Kruegel, C.2
Kirda, E.3
Yin, H.4
Song, D.5
-
28
-
-
70450279044
-
Learning and Classification of Malware Behavior
-
June
-
T. Holz, C. Willems, K. Rieck, P. Duessel, and P. Laskov. Learning and Classification of Malware Behavior. In Fifth Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA 08), June 2008.
-
(2008)
Fifth Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA 08)
-
-
Holz, T.1
Willems, C.2
Rieck, K.3
Duessel, P.4
Laskov, P.5
-
29
-
-
0031644241
-
Approximate nearest neighbors: towards removing the curse of dimensionality
-
P. Indyk and R. Motwani. Approximate nearest neighbors: towards removing the curse of dimensionality. In Proc. of 30th STOC, pages 604–613, 1998.
-
(1998)
Proc. of 30th STOC
, pp. 604-613
-
-
Indyk, P.1
Motwani, R.2
-
30
-
-
33845768389
-
Learning to detect and classify malicious executables in the wild
-
J. Z. Kolter and M. A. Maloof. Learning to detect and classify malicious executables in the wild. J. Mach. Learn. Res., 7:2721–2744, 2006.
-
(2006)
J. Mach. Learn. Res
, vol.7
, pp. 2721-2744
-
-
Kolter, J. Z.1
Maloof, M. A.2
-
32
-
-
51549108952
-
SGNET: a worldwide deployable framework to support the analysis of malware threat models
-
May 7-9, Kaunas, Lituania, 2008
-
C. Leita and M. Dacier. SGNET: a worldwide deployable framework to support the analysis of malware threat models. In EDCC 2008, 7th European Dependable Computing Conference, May 7-9, 2008, Kaunas, Lituania, 2008.
-
(2008)
EDCC 2008, 7th European Dependable Computing Conference
-
-
Leita, C.1
Dacier, M.2
-
34
-
-
14344262813
-
Obfuscation of executable code to improve resistance to static disassembly
-
New York, NY, USA, ACM
-
C. Linn and S. Debray. Obfuscation of executable code to improve resistance to static disassembly. In CCS’03: Proceedings of the 10th ACM conference on Computer and communications security, pages 290–299, New York, NY, USA, 2003. ACM.
-
(2003)
CCS’03: Proceedings of the 10th ACM conference on Computer and communications security
, pp. 290-299
-
-
Linn, C.1
Debray, S.2
-
37
-
-
34548737161
-
Exploring multiple execution paths for malware analysis
-
A. Moser, C. Kruegel, and E. Kirda. Exploring multiple execution paths for malware analysis. In Security and Privacy, 2007. SP’07. IEEE Symposium on, pages 231–245, 2007.
-
(2007)
Security and Privacy, 2007. SP’07. IEEE Symposium on
, pp. 231-245
-
-
Moser, A.1
Kruegel, C.2
Kirda, E.3
-
38
-
-
48649087530
-
Limits of Static Analysis for Malware Detection
-
IEEE Computer Society
-
A. Moser, C. Kruegel, and E. Kirda. Limits of Static Analysis for Malware Detection. In ACSAC, pages 421–430. IEEE Computer Society, 2007.
-
(2007)
ACSAC
, pp. 421-430
-
-
Moser, A.1
Kruegel, C.2
Kirda, E.3
-
39
-
-
79953672829
-
Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software
-
J. Newsome and D. Song. Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software. In 12th Annual Network and Distributed System Security Symposium (NDSS), 2005.
-
(2005)
12th Annual Network and Distributed System Security Symposium (NDSS)
-
-
Newsome, J.1
Song, D.2
-
40
-
-
0033295259
-
Bro: a system for detecting network intruders in real-time
-
V. Paxson. Bro: a system for detecting network intruders in real-time. Comput. Networks, 31(23-24):2435–2463, 1999.
-
(1999)
Comput. Networks
, vol.31
, Issue.23-24
, pp. 2435-2463
-
-
Paxson, V.1
-
41
-
-
33750325871
-
Argos: an Emulator for Fingerprinting Zero-Day Attacks
-
Leuven, Belgium, April
-
G. Portokalidis, A. Slowinska, and H. Bos. Argos: an Emulator for Fingerprinting Zero-Day Attacks. In Proc. ACM SIGOPS EUROSYS’2006, Leuven, Belgium, April 2006.
-
(2006)
Proc. ACM SIGOPS EUROSYS’2006
-
-
Portokalidis, G.1
Slowinska, A.2
Bos, H.3
-
42
-
-
3042581533
-
-
Addison-Wesley Longman Publishing Co., Inc., Boston, MA, USA
-
L. Spitzner. Honeypots: Tracking Hackers. Addison-Wesley Longman Publishing Co., Inc., Boston, MA, USA, 2002.
-
(2002)
Honeypots: Tracking Hackers
-
-
Spitzner, L.1
-
46
-
-
77950788046
-
Panorama: capturing system-wide information flow for malware detection and analysis
-
New York, NY, USA, ACM
-
H. Yin, D. Song, M. Egele, C. Kruegel, and E. Kirda. Panorama: capturing system-wide information flow for malware detection and analysis. In CCS’07: Proceedings of the 14th ACM conference on Computer and communications security, pages 116–127, New York, NY, USA, 2007. ACM.
-
(2007)
CCS’07: Proceedings of the 14th ACM conference on Computer and communications security
, pp. 116-127
-
-
Yin, H.1
Song, D.2
Egele, M.3
Kruegel, C.4
Kirda, E.5
|