-
1
-
-
84882738195
-
Automatically identifying trigger-based behavior in malware
-
BRUMLEY, D., HARTWIG, C., LIANG, Z., NEWSOME, J., SONG, D., AND YIN, H. Automatically identifying trigger-based behavior in malware. Botnet Detection (2008), 65-88.
-
(2008)
Botnet Detection
, pp. 65-88
-
-
BRUMLEY, D.1
HARTWIG, C.2
LIANG, Z.3
NEWSOME, J.4
SONG, D.5
YIN, H.6
-
2
-
-
74049095923
-
Dispatcher: Enabling Active Botnet Infiltration using Automatic Protocol Reverse-Engineering
-
CCS'09
-
CABALLERO, J., POOSANKAM, P., KREIBICH, C., AND SONG, D. Dispatcher: Enabling Active Botnet Infiltration using Automatic Protocol Reverse-Engineering. In Proceedings of the 16th ACM Conference on Computer and Communication Security (2009), CCS'09.
-
(2009)
Proceedings of the 16th ACM Conference on Computer and Communication Security
-
-
CABALLERO, J.1
POOSANKAM, P.2
KREIBICH, C.3
SONG, D.4
-
5
-
-
70349240080
-
Ether: malware analysis via hardware virtualization extensions
-
DINABURG, A., ROYAL, P., SHARIF, M., AND LEE, W. Ether: malware analysis via hardware virtualization extensions. In Proceedings of the 15th ACM conference on Computer and Communications Security (2008).
-
(2008)
Proceedings of the 15th ACM conference on Computer and Communications Security
-
-
DINABURG, A.1
ROYAL, P.2
SHARIF, M.3
LEE, W.4
-
6
-
-
85076455369
-
Cloaking malware with the trusted platform module
-
DUNN, A. M., HOFMANN, O. S., WATERS, B., AND WITCHEL, E. Cloaking malware with the trusted platform module. In Proceedings of the 20th USENIX conference on Security (2011).
-
(2011)
Proceedings of the 20th USENIX conference on Security
-
-
DUNN, A. M.1
HOFMANN, O. S.2
WATERS, B.3
WITCHEL, E.4
-
7
-
-
85077680022
-
Behavior-based spyware detection
-
KIRDA, E., KRUEGEL, C., BANKS, G., VIGNA, G., AND KEM-MERER, R. Behavior-based spyware detection. In Proceedings of the USENIX Security Symposium (2006).
-
(2006)
Proceedings of the USENIX Security Symposium
-
-
KIRDA, E.1
KRUEGEL, C.2
BANKS, G.3
VIGNA, G.4
KEM-MERER, R.5
-
8
-
-
85076206522
-
Effective and efficient malware detection at the end host
-
KOLBITSCH, C., COMPARETTI, P., KRUEGEL, C., KIRDA, E., ZHOU, X., AND WANG, X. Effective and efficient malware detection at the end host. In Proceedings of the 18th conference on USENIX security symposium (2009).
-
(2009)
Proceedings of the 18th conference on USENIX security symposium
-
-
KOLBITSCH, C.1
COMPARETTI, P.2
KRUEGEL, C.3
KIRDA, E.4
ZHOU, X.5
WANG, X.6
-
9
-
-
85084163236
-
A fistful of red-pills: How to automatically generate procedures to detect cpu emulators
-
PALEARI, R., MARTIGNONI, L., ROGLIA, G., AND BRUSCHI, D. A fistful of red-pills: How to automatically generate procedures to detect cpu emulators. In Proceedings of the 3rd USENIX conference on Offensive technologies (2009).
-
(2009)
Proceedings of the 3rd USENIX conference on Offensive technologies
-
-
PALEARI, R.1
MARTIGNONI, L.2
ROGLIA, G.3
BRUSCHI, D.4
-
10
-
-
34748820878
-
Polyunpack: Automating the hidden-code extraction of unpack-executing malware
-
ROYAL, P., HALPIN, M., DAGON, D., EDMONDS, R., AND LEE, W. Polyunpack: Automating the hidden-code extraction of unpack-executing malware. In Proceedings of the 22nd Computer Security Applications Conference (ACSAC) (2006).
-
(2006)
Proceedings of the 22nd Computer Security Applications Conference (ACSAC)
-
-
ROYAL, P.1
HALPIN, M.2
DAGON, D.3
EDMONDS, R.4
LEE, W.5
-
12
-
-
85156147536
-
Impeding malware analysis using conditional code obfuscation
-
SHARIF, M., LANZI, A., GIFFIN, J., AND LEE, W. Impeding malware analysis using conditional code obfuscation. In Network and Distributed System Security (NDSS) (2008).
-
(2008)
Network and Distributed System Security (NDSS)
-
-
SHARIF, M.1
LANZI, A.2
GIFFIN, J.3
LEE, W.4
-
13
-
-
70449644479
-
Automatic reverse engineering of malware emulators
-
SHARIF, M., LANZI, A., GIFFIN, J., AND LEE, W. Automatic reverse engineering of malware emulators. In Proceedings of the 30th IEEE Symposium on Security and Privacy (2009).
-
(2009)
Proceedings of the 30th IEEE Symposium on Security and Privacy
-
-
SHARIF, M.1
LANZI, A.2
GIFFIN, J.3
LEE, W.4
-
16
-
-
77950788046
-
Panorama: Capturing system-wide information flow for malware detection and analysis
-
CCS'07
-
YIN, H., SONG, D., EGELE, M., KRUEGEL, C., AND KIRDA, E. Panorama: Capturing system-wide information flow for malware detection and analysis. In Proceedings of the 14th ACM conference on Computer and Communications Security (2007), CCS'07.
-
(2007)
Proceedings of the 14th ACM conference on Computer and Communications Security
-
-
YIN, H.1
SONG, D.2
EGELE, M.3
KRUEGEL, C.4
KIRDA, E.5
|