-
4
-
-
33746454258
-
-
P. Bania. TAPiON, 2005. http://pb.specialised.info/all/tapion/.
-
(2005)
TAPiON
-
-
Bania, P.1
-
6
-
-
33745788387
-
On deriving unknown vulnerabilities from zero-day polymorphic and metamorphic worm exploits
-
J. R. Crandall, Z. Su, S. F. Wu, and F. T. Chong. On deriving unknown vulnerabilities from zero-day polymorphic and metamorphic worm exploits. In Proceedings of the 12th ACM conference on Computer and communications security (CCS), pages 235–248, 2005.
-
(2005)
Proceedings of the 12th ACM Conference on Computer and Communications Security (CCS)
, pp. 235-248
-
-
Crandall, J.R.1
Su, Z.2
Wu, S.F.3
Chong, F.T.4
-
7
-
-
33644565261
-
Polymorphic shellcode engine using spectrum analysis
-
Aug
-
T. Detristan, T. Ulenspiegel, Y. Malcom, and M. Underduk. Polymorphic shellcode engine using spectrum analysis. Phrack, 11(61), Aug. 2003.
-
(2003)
Phrack
, vol.11
, Issue.61
-
-
Detristan, T.1
Ulenspiegel, T.2
Malcom, Y.3
Underduk, M.4
-
9
-
-
37849044998
-
Measurement and analysis of autonomous spreading malware in a university environment
-
J. Goebel, T. Holz, and C. Willems. Measurement and analysis of autonomous spreading malware in a university environment. In Proceedings of the 4th international conference on Detection of Intrusions and Malware, & Vulnerability Assessment (DIMVA), pages 109–128, 2007.
-
(2007)
Proceedings of the 4th International Conference on Detection of Intrusions and Malware, & Vulnerability Assessment (DIMVA)
, pp. 109-128
-
-
Goebel, J.1
Holz, T.2
Willems, C.3
-
10
-
-
84888375990
-
-
K2. ADMmutate, 2001. http://www.ktwo.ca/ ADMmutate- 0.8.4.tar.gz.
-
(2001)
ADMmutate
-
-
-
11
-
-
33746389292
-
Polymorphic worm detection using structural information of ex-ecutables
-
Sept
-
C. Kruegel, E. Kirda, D. Mutz, W. Robertson, and G. Vigna. Polymorphic worm detection using structural information of ex-ecutables. In Proceedings of the International Symposium on Recent Advances in Intrusion Detection (RAID), Sept. 2005.
-
(2005)
Proceedings of the International Symposium on Recent Advances in Intrusion Detection (RAID)
-
-
Kruegel, C.1
Kirda, E.2
Mutz, D.3
Robertson, W.4
Vigna, G.5
-
12
-
-
34547448056
-
Finding diversity in remote code injection exploits
-
J. Ma, J. Dunagan, H. J. Wang, S. Savage, and G. M. Voelker. Finding diversity in remote code injection exploits. In Proceedings of the 6th Internet Measurement Conference (IMC), pages 53–64, 2006.
-
(2006)
Proceedings of the 6th Internet Measurement Conference (IMC)
, pp. 53-64
-
-
Ma, J.1
Dunagan, J.2
Wang, H.J.3
Savage, S.4
Voelker, G.M.5
-
15
-
-
80053650188
-
All your iFRAMEs point to us
-
N. Provos, P. Mavrommatis, M. A. Rajab, and F. Monrose. All your iFRAMEs point to us. In Proceedings of the 17th USENIX Security Symposium, pages 1–16, 2008.
-
(2008)
Proceedings of the 17th USENIX Security Symposium
, pp. 1-16
-
-
Provos, N.1
Mavrommatis, P.2
Rajab, M.A.3
Monrose, F.4
-
16
-
-
38149098941
-
Writing ia32 alphanumeric shellcodes
-
Rix. Aug
-
Rix. Writing ia32 alphanumeric shellcodes. Phrack, 11(57), Aug. 2001.
-
(2001)
Phrack
, vol.11
, Issue.57
-
-
-
17
-
-
78751553661
-
-
Skape. Understanding windows shellcode, 2003. http://www.hick.org/code/skape/papers/ win32- shellcode.pdf.
-
(2003)
Understanding Windows Shellcode
-
-
-
18
-
-
85075105367
-
Implementing a custom x86 encoder
-
Skape. Sept
-
Skape. Implementing a custom x86 encoder. Uninformed, 5, Sept. 2006.
-
(2006)
Uninformed
, vol.5
-
-
-
19
-
-
41549098765
-
On the infeasibility of modeling polymorphic shellcode
-
Y. Song, M. E. Locasto, A. Stavrou, A. D. Keromytis, and S. J. Stolfo. On the infeasibility of modeling polymorphic shellcode. In Proceedings of the 14th ACM conference on Computer and communications security (CCS), pages 541–551, 2007.
-
(2007)
Proceedings of the 14th ACM Conference on Computer and Communications Security (CCS)
, pp. 541-551
-
-
Song, Y.1
Locasto, M.E.2
Stavrou, A.3
Keromytis, A.D.4
Stolfo, S.J.5
-
21
-
-
84941149413
-
-
B.-J. Wever. Alpha 2, 2004. http://www.edup.tudelft.nl/∼bjwever/src/alpha2.c.
-
(2004)
Alpha 2
-
-
Wever, B.-J.1
-
23
-
-
34748920757
-
Analyzing network traffic to detect self-decrypting exploit code
-
Q. Zhang, D. S. Reeves, P. Ning, and S. P. Lyer. Analyzing network traffic to detect self-decrypting exploit code. In Proceedings of the 2nd ACM Symposium on Information, Computer and Communications Security (ASIACCS), pages 4–12, 2007.
-
(2007)
Proceedings of the 2nd ACM Symposium on Information, Computer and Communications Security (ASIACCS)
, pp. 4-12
-
-
Zhang, Q.1
Reeves, D.S.2
Ning, P.3
Lyer, S.P.4
|