-
1
-
-
85076465718
-
-
MyDoom.C Analysis
-
MyDoom.C Analysis, 2004. http://www.secureworks. com/research/threats/mydoom-c/.
-
(2004)
-
-
-
2
-
-
85076458856
-
-
W32/MyDoom@MM
-
W32/MyDoom@MM, 2005. http://vil.nai.com/vil/ content/v_100983.htm.
-
(2005)
-
-
-
3
-
-
85076497986
-
-
W32/AutoRun.GM. F-Secure
-
W32/AutoRun.GM. F-Secure, 2006. http://http: //www.f-secure.com/v-descs/worm_w32_ autorun_gm.shtml.
-
(2006)
-
-
-
5
-
-
85076470209
-
-
Owning Kraken Zombies, a Detailed Discussion
-
Owning Kraken Zombies, a Detailed Discussion, 2008. http://dvlabs.tippingpoint.com/blog/2008/ 04/28/owning-kraken-zombies.
-
(2008)
-
-
-
8
-
-
85076484546
-
-
Intel Trusted Execution Technology (Intel TXT)MLE Developer's Guide
-
Intel Trusted Execution Technology (Intel TXT)MLE Developer's Guide, 2009.
-
(2009)
-
-
-
9
-
-
84871339177
-
-
ST Microelectronics
-
ST Microelectronics, 2010. Private communication.
-
(2010)
Private Communication
-
-
-
11
-
-
84890778445
-
-
Embedded security
-
Embedded security. Infineon Technologies, 2010. http:// www.infineon.com/tpm.
-
(2010)
Infineon Technologies
-
-
-
14
-
-
85076460696
-
-
Wave Systems Corporation
-
Trusted Computing Whitepaper. Wave Systems Corporation, 2010. http://www.wave.com/collateral/Trusted_ Computing_White_Paper.pdf.
-
(2010)
Trusted Computing Whitepaper
-
-
-
16
-
-
85084163246
-
Autograph: Toward automated, distributed worm signature detection
-
AH KIM, H., AND KARP, B. Autograph: Toward Automated, Distributed Worm Signature Detection. In USENIX Security (2004).
-
(2004)
USENIX Security
-
-
Kim, A.H.1
Karp, B.2
-
17
-
-
84910156435
-
Vtpm: Virtualizing the trusted platform module
-
BERGER, S., CACERES, R., GOLDMAN, K. A., PEREZ, R., SAILER, R., AND VAN DOORN, L. vTPM: Virtualizing the Trusted Platform Module. In USENIX Security (2006).
-
(2006)
USENIX Security
-
-
Berger, S.1
Caceres, R.2
Goldman, K.A.3
Perez, R.4
Sailer, R.5
Van Doorn, L.6
-
19
-
-
77954996346
-
Automatically identifying trigger-based behavior in malware
-
Springer
-
BRUMLEY, D., HARTWIG, C., LIANG, Z., NEWSOME, J., SONG, D., AND YIN, H. Automatically Identifying Trigger-based Behavior in Malware. In Botnet Detection. Springer, 2008.
-
(2008)
Botnet Detection
-
-
Brumley, D.1
Hartwig, C.2
Liang, Z.3
Newsome, J.4
Song, D.5
Yin, H.6
-
20
-
-
74049095923
-
Dispatcher: Enabling active botnet infiltration using automatic protocol reverse-engineering
-
CABALLERO, J., POOSANKAM, P., KREIBICH, C., AND SONG, D. Dispatcher: Enabling Active Botnet Infiltration Using Automatic Protocol Reverse-engineering. In CCS (2009).
-
(2009)
CCS
-
-
Caballero, J.1
Poosankam, P.2
Kreibich, C.3
Song, D.4
-
21
-
-
77953274755
-
Attack, solution, and verification for shared authorisation data in tcg tpm
-
Springer
-
CHEN, L., AND RYAN, M. Attack, Solution, and Verification for Shared Authorisation Data in TCG TPM. vol. 5983 of Lecture Notes in Computer Science. Springer, 2010.
-
(2010)
Lecture Notes in Computer Science
, vol.5983
-
-
Chen, L.1
Ryan, M.2
-
22
-
-
85076466504
-
-
CHIEN, E. CodeRed Worm, 2007. http://www.symantec. com/security_response/writeup.jsp?docid= 2001-071911-5755-99.
-
(2007)
CodeRed Worm
-
-
Chien, E.1
-
23
-
-
84924223669
-
Static analysis of executables to detect malicious patterns
-
CHRISTODORESCU, M., AND JHA, S. Static Analysis of Executables to Detect Malicious Patterns. In USENIX Security (2003).
-
(2003)
USENIX Security
-
-
Christodorescu, M.1
Jha, S.2
-
24
-
-
85076456059
-
Identifying dormant functionality in malware programs
-
COMPARETTI, P. M., SALVANESCHI, G., KIRDA, E., KOLBITSCH, C., KRUEGEL, C., AND ZANERO, S. Identifying Dormant Functionality in Malware Programs. In IEEE S&P (2010).
-
(2010)
IEEE S&P
-
-
Comparetti, P.M.1
Salvaneschi, G.2
Kirda, E.3
Kolbitsch, C.4
Kruegel, C.5
Zanero, S.6
-
25
-
-
0343337504
-
Nonmalleable cryptography
-
DOLEV, D., DWORK, C., AND NAOR, M. Nonmalleable cryptography. SIAM J. Comput. 30, 2 (2000), 391-437.
-
(2000)
SIAM J. Comput.
, vol.30
, Issue.2
, pp. 391-437
-
-
Dolev, D.1
Dwork, C.2
Naor, M.3
-
26
-
-
84987798148
-
-
November
-
FALLIERE, N., MURCHU, L. O., AND CHIEN, E. W32.Stuxnet Dossier, 2010. Version 1.3 (November 2010).
-
(2010)
W32.Stuxnet Dossier, 2010 Version 1.3
-
-
Falliere, N.1
Murchu, L.O.2
Chien, E.3
-
28
-
-
70350642087
-
Fully homomorphic encryption using ideal lattices
-
GENTRY, C. Fully homomorphic encryption using ideal lattices. In STOC (2009), pp. 169-178.
-
(2009)
STOC
, pp. 169-178
-
-
Gentry, C.1
-
29
-
-
85077701725
-
Lest we remember: Cold boot attacks on encryption keys
-
HALDERMAN, J. A., SCHOEN, S. D., HENINGER, N., CLARKSON, W., PAUL, W., CAL, J. A., FELDMAN, A. J., AND FELTEN, E. W. Lest we remember: Cold boot attacks on encryption keys. In USENIX Security (2008).
-
(2008)
USENIX Security
-
-
Halderman, J.A.1
Schoen, S.D.2
Heninger, N.3
Clarkson, W.4
Paul, W.5
Cal, J.A.6
Feldman, A.J.7
Felten, E.W.8
-
30
-
-
85076496448
-
Large-scale malware indexing using function-call graphs
-
HU, X., CKER CHIUEH, T., AND SHIN, K. G. Large-scale Malware Indexing Using Function-call Graphs. In CCS (2009).
-
(2009)
CCS
-
-
Hu, X.1
Cker Chiueh, T.2
Shin, K.G.3
-
32
-
-
85077706009
-
Oslo: Improving the security of trusted computing
-
KAUER, B. OSLO: Improving the security of trusted computing. In USENIX Security (2007).
-
(2007)
USENIX Security
-
-
Kauer, B.1
-
33
-
-
54049158076
-
Kvm: The linux virtual machine monitor
-
KIVITY, A. kvm: The Linux Virtual Machine Monitor. In Ottawa Linux Symposium (2007).
-
(2007)
Ottawa Linux Symposium
-
-
Kivity, A.1
-
35
-
-
85076206522
-
Effective and efficient malware detection at the end host
-
KOLBITSCH, C., COMPARETTI, P. M., KRUEGEL, C., KIRDA, E., ZHOU, X., AND WANG, X. Effective and Efficient Malware Detection at the End Host. In USENIX Security (2009).
-
(2009)
USENIX Security
-
-
Kolbitsch, C.1
Comparetti, P.M.2
Kruegel, C.3
Kirda, E.4
Zhou, X.5
Wang, X.6
-
36
-
-
84885687023
-
Inspector gadget: Automated extraction of proprietary gadgets from malware binaries
-
KOLBITSCH, C., HOLZ, T., KRUEGEL, C., AND KIRDA, E. Inspector Gadget: Automated Extraction of Proprietary Gadgets from Malware Binaries. In IEEE S&P (2010).
-
(2010)
IEEE S&P
-
-
Kolbitsch, C.1
Holz, T.2
Kruegel, C.3
Kirda, E.4
-
37
-
-
54249097318
-
Analyzing trusted platform communication
-
KURSAWE, K., SCHELLEKENS, D., AND PRENEEL, B. Analyzing Trusted Platform Communication. In ECRYPT Workshop, CRASH CRyptographic Advances in Secure Hardware (2005).
-
(2005)
ECRYPT Workshop, CRASH CRyptographic Advances in Secure Hardware
-
-
Kursawe, K.1
Schellekens, D.2
Preneel, B.3
-
38
-
-
79960349207
-
-
MATROSOV, A., RODIONOV, E., HARLEY, D., AND MALCHO, J. Stuxnet Under the Microscope, 2010. Revision 1.2.
-
(2010)
Stuxnet under the Microscope, Revision 1.2.
-
-
Matrosov, A.1
Rodionov, E.2
Harley, D.3
Malcho, J.4
-
39
-
-
84863098629
-
Trustvisor: Efficient tcb reduction and attestation
-
MCCUNE, J. M., LI, Y., QU, N., ZHOU, Z., DATTA, A., GLIGOR, V., AND PERRIG, A. TrustVisor: Efficient TCB Reduction and Attestation. In IEEE S&P (2010).
-
(2010)
IEEE S&P
-
-
McCune, J.M.1
Li, Y.2
Qu, N.3
Zhou, Z.4
Datta, A.5
Gligor, V.6
Perrig, A.7
-
40
-
-
55149108173
-
Flicker: An execution infrastructure for tcb minimization
-
MCCUNE, J. M., PARNO, B., PERRIG, A., REITER, M. K., AND ISOZAKI, H. Flicker: An Execution Infrastructure for TCB Minimization. In EuroSys (2008).
-
(2008)
EuroSys
-
-
McCune, J.M.1
Parno, B.2
Perrig, A.3
Reiter, M.K.4
Isozaki, H.5
-
41
-
-
85018519069
-
Safe passage for passwords and other sensitive data
-
MCCUNE, J. M., PERRIG, A., AND REITER, M. K. Safe passage for passwords and other sensitive data. In NDSS (2009).
-
(2009)
NDSS
-
-
McCune, J.M.1
Perrig, A.2
Reiter, M.K.3
-
42
-
-
85013589618
-
-
Institution of Electrical Engineers
-
MITCHELL, C. J., Ed. Trusted Computing. Institution of Electrical Engineers, 2005.
-
(2005)
Trusted Computing
-
-
Mitchell, C.J.1
-
44
-
-
79958721762
-
The modern rogue - Malware with a face
-
O'DEA, H. The Modern Rogue - Malware with a Face. In Virus Bulletin Conference (2009).
-
(2009)
Virus Bulletin Conference
-
-
O'dea, H.1
-
46
-
-
85076470250
-
-
POST, A. W32.Storm.Worm, 2007. http://www.symantec. com/security_response/writeup.jsp?docid= 2001-060615-1534-99.
-
(2007)
W32.Storm.Worm
-
-
Post, A.1
-
47
-
-
34548223126
-
A semantics-based approach to malware detection
-
PREDA, M. D., CHRISTODORESCU, M., JHA, S., AND DEBRAY, S. A Semantics-based Approach to Malware Detection. In POPL (2007).
-
(2007)
POPL
-
-
Preda, M.D.1
Christodorescu, M.2
Jha, S.3
Debray, S.4
-
49
-
-
84991765629
-
Automated worm fingerprinting
-
SINGH, S., ESTAN, C., VARGHESE, G., AND SAVAGE, S. Automated Worm fingerprinting. In OSDI (2004).
-
(2004)
OSDI
-
-
Singh, S.1
Estan, C.2
Varghese, G.3
Savage, S.4
-
51
-
-
83455177098
-
Hacking the smartcard chip
-
TARNOVSKY, C. Hacking the Smartcard Chip. In Black Hat (2010).
-
(2010)
Black Hat
-
-
Tarnovsky, C.1
-
57
-
-
14944376454
-
A study of mass-mailing worms
-
WONG, C., BIELSKI, S., MCCUNE, J. M., AND WANG, C. A Study of Mass-mailing Worms. In ACM Workshop On Rapid Malcode (2004).
-
(2004)
ACM Workshop on Rapid Malcode
-
-
Wong, C.1
Bielski, S.2
McCune, J.M.3
Wang, C.4
-
58
-
-
77950788046
-
Panorama: Capturing system-wide information flow for malware detection and analysis
-
YIN, H., SONG, D., EGELE, M., KRUEGEL, C., AND KIRDA, E. Panorama: Capturing System-wide Information Flow for Malware Detection and Analysis. In CCS (2007).
-
(2007)
CCS
-
-
Yin, H.1
Song, D.2
Egele, M.3
Kruegel, C.4
Kirda, E.5
|