-
1
-
-
85080519930
-
-
ANUBIS. http://anubis.iseclab.org, 2009.
-
(2009)
-
-
-
4
-
-
34547141391
-
The Nepenthes platform: An efficient approach to collect malware
-
BAECHER, P., KOETTER, M., HOLZ, T., DORNSEIF, M., AND FREILING, F. The Nepenthes Platform: An Efficient Approach To Collect Malware. In Recent Advances in Intrusion Detection (RAID) (2006).
-
(2006)
Recent Advances in Intrusion Detection (RAID)
-
-
Baecher, P.1
Koetter, M.2
Holz, T.3
Dornseif, M.4
Freiling, F.5
-
5
-
-
58149084148
-
Automated classification and analysis of internet malware
-
BAILEY, M., OBERHEIDE, J., ANDERSEN, J., MAO, Z., JAHANIAN, F., AND NAZARIO, J. Automated Classification and Analysis of Internet Malware. In Symposium on Recent Advances in Intrusion Detection (RAID) (2007).
-
(2007)
Symposium on Recent Advances in Intrusion Detection (RAID)
-
-
Bailey, M.1
Oberheide, J.2
Andersen, J.3
Mao, Z.4
Jahanian, F.5
Nazario, J.6
-
7
-
-
85043201839
-
Scalable, behavior-based malware clustering
-
BAYER, U., MILANI COMPARETTI, P., HLAUSCHEK, C., KRUEGEL, C., AND KIRDA, E. Scalable, Behavior-Based Malware Clustering. In Network and Distributed System Security Symposium (NDSS) (2009).
-
(2009)
Network and Distributed System Security Symposium (NDSS)
-
-
Bayer, U.1
Milani Comparetti, P.2
Hlauschek, C.3
Kruegel, C.4
Kirda, E.5
-
9
-
-
84924223669
-
Static analysis of executables to detect malicious patterns
-
CHRISTODORESCU, M., AND JHA, S. Static Analysis of Executables to Detect Malicious Patterns. In Usenix Security Symposium (2003).
-
(2003)
Usenix Security Symposium
-
-
Christodorescu, M.1
Jha, S.2
-
12
-
-
27544433210
-
Semantics-aware malware detection
-
CHRISTODORESCU, M., JHA, S., SESHIA, S., SONG, D., AND BRYANT, R. Semantics-Aware Malware Detection. In IEEESymposium on Security and Privacy (2005).
-
(2005)
IEEESymposium on Security and Privacy
-
-
Christodorescu, M.1
Jha, S.2
Seshia, S.3
Song, D.4
Bryant, R.5
-
13
-
-
70350652406
-
Digging for data structures
-
COZZIE, A., STRATTON, F., XUE, H., AND KING, S. Digging For Data Structures . In Symposium on Operating Systems Design and Implementation (OSDI) (2008).
-
(2008)
Symposium on Operating Systems Design and Implementation (OSDI)
-
-
Cozzie, A.1
Stratton, F.2
Xue, H.3
King, S.4
-
14
-
-
48649089769
-
A taxonomy of botnet structures
-
DAGON, D., GU, G., LEE, C., AND LEE, W. A Taxonomy of Botnet Structures. In Annual Computer Security Applications Conference (ACSAC) (2007).
-
(2007)
Annual Computer Security Applications Conference (ACSAC)
-
-
Dagon, D.1
Gu, G.2
Lee, C.3
Lee, W.4
-
15
-
-
84903607772
-
Dynamic spyware analysis
-
EGELE, M., KRUEGEL, C., KIRDA, E., YIN, H., AND SONG, D. Dynamic Spyware Analysis. In Usenix Annual Technical Conference (2007).
-
(2007)
Usenix Annual Technical Conference
-
-
Egele, M.1
Kruegel, C.2
Kirda, E.3
Yin, H.4
Song, D.5
-
16
-
-
85022039521
-
Disk level malware detection
-
FELT, A., PAUL, N., EVANS, D., AND GURUMURTHI, S. Disk Level Malware Detection. In Poster: 15th Usenix Security Symposium (2006).
-
(2006)
Poster: 15th Usenix Security Symposium
-
-
Felt, A.1
Paul, N.2
Evans, D.3
Gurumurthi, S.4
-
17
-
-
85077703150
-
Polymorphic blending attacks
-
FOGLA, P., SHARIF, M., PERDISCI, R., KOLESNIKOV, O., AND LEE, W. Polymorphic Blending Attacks. In 15th Usenix Security Symposium (2006).
-
(2006)
15th Usenix Security Symposium
-
-
Fogla, P.1
Sharif, M.2
Perdisci, R.3
Kolesnikov, O.4
Lee, W.5
-
18
-
-
0029716418
-
A sense of self for Unix processes
-
FORREST, S., HOFMEYR, S., SOMAYAJI, A., AND LONGSTAFF, T. A Sense of Self for Unix Processes. In IEEE Symposium on Security and Privacy (1996).
-
(1996)
IEEE Symposium on Security and Privacy
-
-
Forrest, S.1
Hofmeyr, S.2
Somayaji, A.3
Longstaff, T.4
-
19
-
-
85075837457
-
Bot-Miner: Clustering analysis of network traffic for protocol- And structure-independent botnet detection
-
GU, G., PERDISCI, R., ZHANG, J., AND LEE, W. Bot-Miner: Clustering Analysis of Network Traffic for Protocol- and Structure-Independent Botnet Detection. In 17th Usenix Security Symposium (2008).
-
(2008)
17th Usenix Security Symposium
-
-
Gu, G.1
Perdisci, R.2
Zhang, J.3
Lee, W.4
-
20
-
-
85061529860
-
Bothunter: Detecting malware infection through IDS-driven dialog correlation
-
GU, G., PORRAS, P., YEGNESWARAN, V., FONG, M., AND LEE, W. BotHunter: Detecting Malware Infection Through IDS-Driven Dialog Correlation. In 16th Usenix Security Symposium (2007).
-
(2007)
16th Usenix Security Symposium
-
-
Gu, G.1
Porras, P.2
Yegneswaran, V.3
Fong, M.4
Lee, W.5
-
21
-
-
85028535907
-
Detecting malicious code by model checking
-
KINDER, J., KATZENBEISSER, S., SCHALLHART, C., AND VEITH, H. Detecting Malicious Code by Model Checking. In Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA) (2005).
-
(2005)
Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA)
-
-
Kinder, J.1
Katzenbeisser, S.2
Schallhart, C.3
Veith, H.4
-
22
-
-
85077680022
-
Behavior-based Spyware Detection
-
KIRDA, E., KRUEGEL, C., BANKS, G., VIGNA, G., AND KEM-MERER, R. Behavior-based Spyware Detection. In 15th Usenix Security Symposium (2006).
-
(2006)
15th Usenix Security Symposium
-
-
Kirda, E.1
Kruegel, C.2
Banks, G.3
Vigna, G.4
Kem-Merer, R.5
-
23
-
-
85077528077
-
Automating mimicry attacks using static binary analysis
-
KRUEGEL, C., KIRDA, E., MUTZ, D., ROBERTSON, W., AND VIGNA, G. Automating Mimicry Attacks Using Static Binary Analysis. In 14th Usenix Security Symposium (2005).
-
(2005)
14th Usenix Security Symposium
-
-
Kruegel, C.1
Kirda, E.2
Mutz, D.3
Robertson, W.4
Vigna, G.5
-
24
-
-
33746389292
-
Polymorphic worm detection using structural information of executables
-
KRUEGEL, C., KIRDA, E., MUTZ, D., ROBERTSON, W., AND VIGNA, G. Polymorphic Worm Detection Using Structural Information of Executables. In Symposium on Recent Advances in Intrusion Detection (RAID) (2005).
-
(2005)
Symposium on Recent Advances in Intrusion Detection (RAID)
-
-
Kruegel, C.1
Kirda, E.2
Mutz, D.3
Robertson, W.4
Vigna, G.5
-
26
-
-
70449665748
-
A study of malcode-bearing documents
-
LI, W., STOLFO, S., STAVROU, A., ANDROULAKI, E., AND KEROMYTIS, A. A Study of Malcode-Bearing Documents. In Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA) (2007).
-
(2007)
Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA)
-
-
Li, W.1
Stolfo, S.2
Stavrou, A.3
Androulaki, E.4
Keromytis, A.5
-
27
-
-
33745456200
-
Fileprints: Identifying file types by n-gram analysis
-
LI, W., WANG, K., STOLFO, S., AND HERZOG, B. Fileprints: Identifying File Types by N-Gram Analysis. In IEEEInformation Assurance Workshop (2005).
-
(2005)
IEEEInformation Assurance Workshop
-
-
Li, W.1
Wang, K.2
Stolfo, S.3
Herzog, B.4
-
28
-
-
85049001594
-
AGIS: Automatic generation of infection signatures
-
LI, Z., WANG, X., LIANG, Z., AND REITER, M. AGIS: Automatic Generation of Infection Signatures. In Conference on Dependable Systems and Networks (DSN) (2008).
-
(2008)
Conference on Dependable Systems and Networks (DSN)
-
-
Li, Z.1
Wang, X.2
Liang, Z.3
Reiter, M.4
-
29
-
-
78049387622
-
A layered architecture for detecting malicious behaviors
-
MARTIGNONI, L., STINSON, E., FREDRIKSON, M., JHA, S., AND MITCHELL, J. C. A Layered Architecture for Detecting Malicious Behaviors. In Symposium on Recent Advances in Intrusion Detection (RAID) (2008).
-
(2008)
Symposium on Recent Advances in Intrusion Detection (RAID)
-
-
Martignoni, L.1
Stinson, E.2
Fredrikson, M.3
Jha, S.4
Mitchell, J.C.5
-
31
-
-
85077681170
-
A Crawler-based Study of Spyware on the Web
-
MOSHCHUK, A., BRAGIN, T., GRIBBLE, S., AND LEVY, H. A Crawler-based Study of Spyware on the Web. In Network and Distributed Systems Security Symposium (NDSS) (2006).
-
(2006)
Network and Distributed Systems Security Symposium (NDSS)
-
-
Moshchuk, A.1
Bragin, T.2
Gribble, S.3
Levy, H.4
-
33
-
-
0033295259
-
BrO: A system for detecting network intruders in real-time
-
PAXSON, V. Bro: A System for Detecting Network Intruders in Real-Time. Computer Networks 31 (1999).
-
(1999)
Computer Networks
, vol.31
-
-
Paxson, V.1
-
35
-
-
80053650188
-
All your iFrames point to us
-
PROVOS, N., MAVROMMATIS, P., RAJAB, M., AND MONROSE, F. All Your iFrames Point to Us. In 17th Usenix Security Symposium (2008).
-
(2008)
17th Usenix Security Symposium
-
-
Provos, N.1
Mavrommatis, P.2
Rajab, M.3
Monrose, F.4
-
37
-
-
34547399387
-
A multifaceted approach to understanding the botnet phenomenon
-
RAJAB, M., ZARFOSS, J., MONROSE, F., AND TERZIS, A. A Multifaceted Approach to Understanding the Botnet Phenomenon. In Internet Measurement Conference (IMC) (2006).
-
(2006)
Internet Measurement Conference (IMC)
-
-
Rajab, M.1
Zarfoss, J.2
Monrose, F.3
Terzis, A.4
-
39
-
-
70450279044
-
Learning and classification of malware behavior
-
RIECK, K., HOLZ, T., WILLEMS, C., DUESSEL, P., AND LASKOV, P. Learning and classification of malware behavior. In Conference on Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA) (2008).
-
(2008)
Conference on Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA)
-
-
Rieck, K.1
Holz, T.2
Willems, C.3
Duessel, P.4
Laskov, P.5
-
40
-
-
34748820878
-
Polyunpack: Automating the hidden-code extraction of unpack-executing malware
-
ROYAL, P., HALPIN, M., DAGON, D., EDMONDS, R., AND LEE, W. PolyUnpack: Automating the Hidden-Code Extraction of Unpack-Executing Malware. In Annual Computer Security Application Conference (ACSAC) (2006).
-
(2006)
Annual Computer Security Application Conference (ACSAC)
-
-
Royal, P.1
Halpin, M.2
Dagon, D.3
Edmonds, R.4
Lee, W.5
-
41
-
-
84991765629
-
Automated worm fingerprinting
-
SINGH, S., ESTAN, C., VARGHESE, G., AND SAVAGE, S. Automated Worm Fingerprinting. In Symposium on Operating Systems Design and Implementation (OSDI) (2004).
-
(2004)
Symposium on Operating Systems Design and Implementation (OSDI)
-
-
Singh, S.1
Estan, C.2
Varghese, G.3
Savage, S.4
-
42
-
-
78651523935
-
To catch a predator: A natural language approach for eliciting malicious payloads
-
SMALL, S., MASON, J., MONROSE, F., PROVOS, N., AND STUBBLEFIELD, A. To Catch A Predator: A Natural Language Approach for Eliciting Malicious Payloads. In 17th Usenix Security Symposium (2008).
-
(2008)
17th Usenix Security Symposium
-
-
Small, S.1
Mason, J.2
Monrose, F.3
Provos, N.4
Stubblefield, A.5
-
45
-
-
84969564072
-
One-way isolation: An effective approach for realizing safe execution environments
-
SUN, W., LIANG, Z., VENKATAKRISHNAN, V., AND SEKAR, R. One-way Isolation: An Effective Approach for Realizing Safe Execution Environments. In Network and Distributed Systems Symposium (NDSS) (2005).
-
(2005)
Network and Distributed Systems Symposium (NDSS)
-
-
Sun, W.1
Liang, Z.2
Venkatakrishnan, V.3
Sekar, R.4
-
51
-
-
84904088330
-
Automated web patrol with strider honeymonkeys: Finding web sites that exploit browser vulnerabilities
-
WANG, Y., BECK, D., JIANG, X., ROUSSEV, R., VERBOWSKI, C., CHEN, S., AND KING, S. Automated Web Patrol with Strider HoneyMonkeys: Finding Web Sites That Exploit Browser Vulnerabilities. In Network and Distributed System Security Symposium (NDSS) (2006).
-
(2006)
Network and Distributed System Security Symposium (NDSS)
-
-
Wang, Y.1
Beck, D.2
Jiang, X.3
Roussev, R.4
Verbowski, C.5
Chen, S.6
King, S.7
-
52
-
-
27544461178
-
Detecting Stealth Software with Strider Ghost-buster
-
WANG, Y., BECK, D., VO, B., ROUSSEV, R., AND VERBOWSKI, C. Detecting Stealth Software with Strider Ghost-buster. In Conference on Dependable Systems and Networks (DSN) (2005).
-
(2005)
Conference on Dependable Systems and Networks (DSN)
-
-
Wang, Y.1
Beck, D.2
Vo, B.3
Roussev, R.4
Verbowski, C.5
-
54
-
-
34047110218
-
Toward automated dynamic malware analysis using CWsandbox
-
WILLEMS, C., HOLZ, T., AND FREILING, F. Toward Automated Dynamic Malware Analysis Using CWSandbox. IEEE Security and Privacy 2, 2007 (5).
-
(2007)
IEEE Security and Privacy
, vol.2
, Issue.5
-
-
Willems, C.1
Holz, T.2
Freiling, F.3
-
55
-
-
77950788046
-
Panorama: Capturing System-wide Information Flow for Malware Detection and Analysis
-
YIN, H., SONG, D., EGELE, M., KRUEGEL, C., AND KIRDA, E. Panorama: Capturing System-wide Information Flow for Malware Detection and Analysis. In ACM Conference on Computer and Communication Security (CCS) (2007).
-
(2007)
ACM Conference on Computer and Communication Security (CCS)
-
-
Yin, H.1
Song, D.2
Egele, M.3
Kruegel, C.4
Kirda, E.5
|