-
1
-
-
85064176806
-
Measuring pay-per-install: The commoditization of malware distribution
-
J. Caballero, C. Grier, C. Kreibich, and V. Paxson, “Measuring pay-per-install: The commoditization of malware distribution,” in Proc. USENIX Security Sym., 2011.
-
(2011)
Proc. USENIX Security Sym.
-
-
Caballero, J.1
Grier, C.2
Kreibich, C.3
Paxson, V.4
-
2
-
-
85084163246
-
Autograph: Toward automated, distributed worm signature detection
-
H.-A. Kim and B. Karp, “Autograph: Toward automated, distributed worm signature detection,” in Proc. Conf. on USENIX Security Sym., vol. 13, 2004, pp. 271–286.
-
(2004)
Proc. Conf. On USENIX Security Sym.
, vol.13
, pp. 271-286
-
-
Kim, H.-A.1
Karp, B.2
-
3
-
-
33645791274
-
Honeycomb: Creating intrusion detection signatures using honeypots
-
C. Kreibich and J. Crowcroft, “Honeycomb: Creating intrusion detection signatures using honeypots,” ACM SIGCOMM Computer Communication Review, vol. 34, no. 1, pp. 51–56, 2004.
-
(2004)
ACM SIGCOMM Computer Communication Review
, vol.34
, Issue.1
, pp. 51-56
-
-
Kreibich, C.1
Crowcroft, J.2
-
4
-
-
33751064824
-
Hamsa: Fast signature generation for zero-day polymorphic worms with provable attack resilience
-
Z. Li, M. Sanghi, Y. Chen, M.-Y. Kao, and B. Chavez, “Hamsa: Fast signature generation for zero-day polymorphic worms with provable attack resilience,” in Proc. IEEE Sym. on Security & Privacy (S&P), 2006, pp. 32–47.
-
(2006)
Proc. IEEE Sym. On Security & Privacy (S&P)
, pp. 32-47
-
-
Li, Z.1
Sanghi, M.2
Chen, Y.3
Kao, M.-Y.4
Chavez, B.5
-
5
-
-
27544498978
-
PolyGraph: Automatically generating signatures for polymorphic worms
-
J. Newsome, B. Karp, and D. Song, “Polygraph: Automatically generating signatures for polymorphic worms,” in Proc. IEEE Sym. on Security & Privacy (S&P), 2005, pp. 226–241.
-
(2005)
Proc. IEEE Sym. On Security & Privacy (S&P)
, pp. 226-241
-
-
Newsome, J.1
Karp, B.2
Song, D.3
-
6
-
-
84991765629
-
Automated worm fingerprinting
-
S. Singh, C. Estan, G. Varghese, and S. Savage, “Automated worm fingerprinting,” in Proc. Conf. on Sym. on Opearting Systems Design & Implementation (OSDI), vol. 6, 2004, pp. 45–60.
-
(2004)
Proc. Conf. On Sym. On Opearting Systems Design & Implementation (OSDI)
, vol.6
, pp. 45-60
-
-
Singh, S.1
Estan, C.2
Varghese, G.3
Savage, S.4
-
7
-
-
33750335757
-
Anagram: A content anomaly detector resistant to mimicry attack
-
K. Wang, J. J. Parekh, and S. J. Stolfo, “Anagram: A content anomaly detector resistant to mimicry attack,” in Proc. Int. Conf. on Recent Advances in Intrusion Detection (RAID), 2006, pp. 226–248.
-
(2006)
Proc. Int. Conf. On Recent Advances in Intrusion Detection (RAID)
, pp. 226-248
-
-
Wang, K.1
Parekh, J.J.2
Stolfo, S.J.3
-
9
-
-
34047129159
-
Using entropy analysis to find encrypted and packed malware
-
R. Lyda and J. Hamrock, “Using entropy analysis to find encrypted and packed malware,” IEEE Security & Privacy, vol. 5, no. 2, pp. 40–45, 2007.
-
(2007)
IEEE Security & Privacy
, vol.5
, Issue.2
, pp. 40-45
-
-
Lyda, R.1
Hamrock, J.2
-
10
-
-
85077703150
-
Polymorphic blending attacks
-
P. Fogla, M. Sharif, R. Perdisci, O. Kolesnikov, and W. Lee, “Polymorphic blending attacks,” in Proc. Conf. on USENIX Security Symposium, vol. 15, 2006.
-
(2006)
Proc. Conf. On USENIX Security Symposium
, vol.15
-
-
Fogla, P.1
Sharif, M.2
Perdisci, R.3
Kolesnikov, O.4
Lee, W.5
-
11
-
-
33745670395
-
Polymorphic worm detection using structural information of executables
-
C. Kruegel, E. Kirda, D. Mutz, W. Robertson, and G. Vigna, “Polymorphic worm detection using structural information of executables,” in Proc. Int. Conf. on Recent Advances in Intrusion Detection (RAID), 2005, pp. 207–226.
-
(2005)
Proc. Int. Conf. On Recent Advances in Intrusion Detection (RAID)
, pp. 207-226
-
-
Kruegel, C.1
Kirda, E.2
Mutz, D.3
Robertson, W.4
Vigna, G.5
-
12
-
-
77952351839
-
The geometry of innocent flesh on the bone: Return-into-libc without function calls (on the x86)
-
H. Shacham, “The geometry of innocent flesh on the bone: Return-into-libc without function calls (on the x86),” in Proc. ACM Conf. on Computer and Communications Security (CCS), 2007, pp. 552–561.
-
(2007)
Proc. ACM Conf. On Computer and Communications Security (CCS)
, pp. 552-561
-
-
Shacham, H.1
-
13
-
-
84859457954
-
Return-oriented programming: Systems, languages, and applications
-
R. Roemer, E. Buchanan, H. Shacham, and S. Savage, “Return-oriented programming: Systems, languages, and applications,” ACM Trans. on Information and System Security (TISSEC), vol. 15, no. 1, 2012.
-
(2012)
ACM Trans. On Information and System Security (TISSEC)
, vol.15
, Issue.1
-
-
Roemer, R.1
Buchanan, E.2
Shacham, H.3
Savage, S.4
-
15
-
-
78650018640
-
Mimimorphism: A new approach to binary code obfuscation
-
Z. Wu, S. Gianvecchio, M. Xie, and H. Wang, “Mimimorphism: A new approach to binary code obfuscation,” in Proc. ACM Conf. on Computer and Communications Security (CSS), 2010, pp. 536–546.
-
(2010)
Proc. ACM Conf. On Computer and Communications Security (CSS)
, pp. 536-546
-
-
Wu, Z.1
Gianvecchio, S.2
Xie, M.3
Wang, H.4
-
16
-
-
80053509259
-
Obfuscation: The hidden malware
-
P. O’Kane, S. Sezer, and K. McLaughlin, “Obfuscation: The hidden malware,” IEEE Security & Privacy, vol. 9, no. 5, pp. 41–47, 2011.
-
(2011)
IEEE Security & Privacy
, vol.9
, Issue.5
, pp. 41-47
-
-
O’Kane, P.1
Sezer, S.2
McLaughlin, K.3
-
17
-
-
82655184735
-
A PVS based framework for validating compiler optimizations
-
A. Kanade, A. Sanyal, and U. Khedker, “A PVS based framework for validating compiler optimizations,” in Proc. IEEE Int. Conf. on Software Engineering and Formal Methods (SEFM), 2006, pp. 108–117.
-
(2006)
Proc. IEEE Int. Conf. On Software Engineering and Formal Methods (SEFM)
, pp. 108-117
-
-
Kanade, A.1
Sanyal, A.2
Khedker, U.3
-
19
-
-
79959887156
-
Evaluating value-graph translation validation for LLVM
-
J.-B. Tristan, P. Govereau, and G. Morrisett, “Evaluating value-graph translation validation for LLVM,” in Proc. ACM SIGPLAN Conf. on Programming Language Design and Implementation (PLDI), 2011, pp. 295–305.
-
(2011)
Proc. ACM SIGPLAN Conf. On Programming Language Design and Implementation (PLDI)
, pp. 295-305
-
-
Tristan, J.-B.1
Govereau, P.2
Morrisett, G.3
-
20
-
-
67649855320
-
Equality saturation: A new approach to optimization
-
R. Tate, M. Stepp, Z. Tatlock, and S. Lerner, “Equality saturation: A new approach to optimization,” in Proc. ACM SIGPLAN-SIGACT Sym. on Principles of Programming Languages (POPL), 2009, pp. 264–276.
-
(2009)
Proc. ACM SIGPLAN-SIGACT Sym. On Principles of Programming Languages (POPL)
, pp. 264-276
-
-
Tate, R.1
Stepp, M.2
Tatlock, Z.3
Lerner, S.4
-
22
-
-
34548863109
-
Design of a certifying compiler supporting proof of program safety
-
Y. Chen, L. Ge, B. Hua, Z. Li, and C. Liu, “Design of a certifying compiler supporting proof of program safety,” in Proc. Joint IEEE/IFIP Sym. on Theoretical Aspects of Software Engineering (TASE), 2007, pp. 127–138.
-
(2007)
Proc. Joint IEEE/IFIP Sym. On Theoretical Aspects of Software Engineering (TASE)
, pp. 127-138
-
-
Chen, Y.1
Ge, L.2
Hua, B.3
Li, Z.4
Liu, C.5
|