-
1
-
-
84893332856
-
-
VirusTotal. https://www.virustotal.com/.
-
VirusTotal
-
-
-
3
-
-
85068675731
-
Detecting malware domains at the upper dns hierarchy
-
M. Antonakakis, R. Perdisci, W. Lee, N. Vasiloglou II, and D. Dagon. Detecting malware domains at the upper dns hierarchy. In Proceedings of the 20th USENIX Security Symposium, USENIX Security, volume 11, 2011.
-
(2011)
Proceedings of the 20th USENIX Security Symposium, USENIX Security
, vol.11
-
-
Antonakakis, M.1
Perdisci, R.2
Lee, W.3
Vasiloglou, N.4
Dagon, D.5
-
4
-
-
81055155523
-
An efficient vm-based software protection
-
IEEE
-
A. Averbuch, M. Kiperberg, and N. Zaidenberg. An efficient vm-based software protection. In Network and System Security (NSS), 2011 5th International Conference on, pages 121-128. IEEE, 2011.
-
(2011)
Network and System Security (NSS), 2011 5th International Conference on
, pp. 121-128
-
-
Averbuch, A.1
Kiperberg, M.2
Zaidenberg, N.3
-
5
-
-
84879219725
-
Exposure: Finding malicious domains using passive dns analysis
-
The Internet Society
-
L. Bilge, E. Kirda, C. Kruegel, and M. Balduzzi. Exposure: Finding malicious domains using passive dns analysis. In NDSS. The Internet Society, 2011.
-
(2011)
NDSS
-
-
Bilge, L.1
Kirda, E.2
Kruegel, C.3
Balduzzi, M.4
-
6
-
-
85180414777
-
-
Bit9. July
-
Bit9. Bit9 Global Software Registry. http://www.bit9.com/products/bit9-global-software-registry.php, July 2012.
-
(2012)
Bit9 Global Software Registry
-
-
-
7
-
-
85064176806
-
Measuring Pay-per-Install: The Commoditization of Malware Distribution
-
San Francisco, CA, August
-
J. Caballero, C. Grier, C. Kreibich, and V. Paxson. Measuring Pay-per-Install: The Commoditization of Malware Distribution. In Proceedings of the the 20th USENIX Security Symposium, San Francisco, CA, August 2011.
-
(2011)
Proceedings of the the 20th USENIX Security Symposium
-
-
Caballero, J.1
Grier, C.2
Kreibich, C.3
Paxson, V.4
-
8
-
-
47749140025
-
Bigtable: A distributed storage system for structured data
-
F. Chang, J. Dean, S. Ghemawat, W. Hsieh, D. Wallach, M. Burrows, T. Chandra, A. Fikes, and R. Gruber. Bigtable: A distributed storage system for structured data. ACM Transactions on Computer Systems (TOCS), 26(2):1-26, 2008.
-
(2008)
ACM Transactions on Computer Systems (TOCS)
, vol.26
, Issue.2
, pp. 1-26
-
-
Chang, F.1
Dean, J.2
Ghemawat, S.3
Hsieh, W.4
Wallach, D.5
Burrows, M.6
Chandra, T.7
Fikes, A.8
Gruber, R.9
-
9
-
-
27544433210
-
Semantics-aware malware detection
-
M. Christodorescu, S. Jha, S. Seshia, D. Song, and R. Bryant. Semantics-aware malware detection. IEEE Symposium on Security and Privacy, pages 32-46, 2005.
-
(2005)
IEEE Symposium on Security and Privacy
, pp. 32-46
-
-
Christodorescu, M.1
Jha, S.2
Seshia, S.3
Song, D.4
Bryant, R.5
-
12
-
-
78249283520
-
An analysis of rogue av campaigns
-
Springer
-
M. Cova, C. Leita, O. Thonnard, A. Keromytis, and M. Dacier. An analysis of rogue av campaigns. In Recent Advances in Intrusion Detection, pages 442-463. Springer, 2010.
-
(2010)
Recent Advances in Intrusion Detection
, pp. 442-463
-
-
Cova, M.1
Leita, C.2
Thonnard, O.3
Keromytis, A.4
Dacier, M.5
-
16
-
-
85180408199
-
-
Google. July
-
Google. Google Safe Browsing API. http://code.google.com/apis/safebrowsing/, July 2012.
-
(2012)
Google Safe Browsing API
-
-
-
17
-
-
50249182906
-
Secure web browsing with the op web browser
-
Ieee
-
C. Grier, S. Tang, and S. King. Secure web browsing with the op web browser. In Security and Privacy, 2008. SP 2008. IEEE Symposium on, pages 402-416. Ieee, 2008.
-
(2008)
Security and Privacy, 2008. SP 2008. IEEE Symposium on
, pp. 402-416
-
-
Grier, C.1
Tang, S.2
King, S.3
-
18
-
-
85041447270
-
Detecting spammers with snare: spatio-temporal network-level automatic reputation engine
-
Berkeley, CA, USA, USENIX Association
-
S. Hao, N. A. Syed, N. Feamster, A. G. Gray, and S. Krasser. Detecting spammers with snare: spatio-temporal network-level automatic reputation engine. In Proceedings of the 18th conference on USENIX security symposium, SSYM'09, pages 101-118, Berkeley, CA, USA, 2009. USENIX Association.
-
(2009)
Proceedings of the 18th conference on USENIX security symposium, SSYM'09
, pp. 101-118
-
-
Hao, S.1
Syed, N. A.2
Feamster, N.3
Gray, A. G.4
Krasser, S.5
-
19
-
-
71649094416
-
A survey of attack and defense techniques for reputation systems
-
K. Hoffman, D. Zage, and C. Nita-Rotaru. A survey of attack and defense techniques for reputation systems. ACM Computing Surveys (CSUR), 42(1):1, 2009.
-
(2009)
ACM Computing Surveys (CSUR)
, vol.42
, Issue.1
, pp. 1
-
-
Hoffman, K.1
Zage, D.2
Nita-Rotaru, C.3
-
20
-
-
85076490024
-
Show me the money: Characterizing spam-advertised revenue
-
San Francisco, CA
-
C. Kanich, N. Weaver, D. McCoy, T. Halvorson, C. Kreibich, K. Levchenko, V. Paxson, G. Voelker, and S. Savage. Show me the money: Characterizing spam-advertised revenue. In Proceedings of the 20th USENIX Security Symposium, San Francisco, CA, 2011.
-
(2011)
Proceedings of the 20th USENIX Security Symposium
-
-
Kanich, C.1
Weaver, N.2
McCoy, D.3
Halvorson, T.4
Kreibich, C.5
Levchenko, K.6
Paxson, V.7
Voelker, G.8
Savage, S.9
-
21
-
-
78650002259
-
Blade: an attack-agnostic approach for preventing drive-by malware infections
-
ACM
-
L. Lu, V. Yegneswaran, P. Porras, and W. Lee. Blade: an attack-agnostic approach for preventing drive-by malware infections. In Proceedings of the 17th ACM conference on Computer and communications security, pages 440-450. ACM, 2010.
-
(2010)
Proceedings of the 17th ACM conference on Computer and communications security
, pp. 440-450
-
-
Lu, L.1
Yegneswaran, V.2
Porras, P.3
Lee, W.4
-
22
-
-
85180409469
-
-
McAfee. July
-
McAfee. McAfee Site Advisor. http://www.siteadvisor.com/, July 2012.
-
(2012)
McAfee Site Advisor
-
-
-
23
-
-
85172508645
-
-
Norton. July
-
Norton. Norton Safe Web. http://safeweb.norton.com, July 2012.
-
(2012)
Norton Safe Web
-
-
-
25
-
-
80053650188
-
All Your iFRAMEs Point to Us
-
N. Provos, P. Mavrommatis, M. A. Rajab, and F. Monrose. All Your iFRAMEs Point to Us. In USENIX Security Symposium, pages 1-16, 2008.
-
(2008)
USENIX Security Symposium
, pp. 1-16
-
-
Provos, N.1
Mavrommatis, P.2
Rajab, M. A.3
Monrose, F.4
-
26
-
-
85089726744
-
On network-level clusters for spam detection
-
The Internet Society
-
Z. Qian, Z. M. Mao, Y. Xie, and F. Yu. On network-level clusters for spam detection. In NDSS. The Internet Society, 2010.
-
(2010)
NDSS
-
-
Qian, Z.1
Mao, Z. M.2
Xie, Y.3
Yu, F.4
-
27
-
-
84860775300
-
-
Technical report, Google, Tech. Rep., July
-
M. Rajab, L. Ballard, N. Jagpal, P. Mavrommatis, D. Nojiri, N. Provos, and L. Schmidt. Trends in circumventing web-malware detection. Technical report, Google, Tech. Rep., July 2011.
-
(2011)
Trends in circumventing web-malware detection
-
-
Rajab, M.1
Ballard, L.2
Jagpal, N.3
Mavrommatis, P.4
Nojiri, D.5
Provos, N.6
Schmidt, L.7
-
29
-
-
78651527121
-
Browser security: lessons from google chrome
-
C. Reis, A. Barth, and C. Pizano. Browser security: lessons from google chrome. Queue, 7(5):3, 2009.
-
(2009)
Queue
, vol.7
, Issue.5
, pp. 3
-
-
Reis, C.1
Barth, A.2
Pizano, C.3
-
30
-
-
34748820878
-
Polyunpack: Automating the hidden-code extraction of unpack-executing malware
-
IEEE
-
P. Royal, M. Halpin, D. Dagon, R. Edmonds, and W. Lee. Polyunpack: Automating the hidden-code extraction of unpack-executing malware. In Computer Security Applications Conference, 2006. ACSAC'06. 22nd Annual, pages 289-300. IEEE, 2006.
-
(2006)
Computer Security Applications Conference, 2006. ACSAC'06. 22nd Annual
, pp. 289-300
-
-
Royal, P.1
Halpin, M.2
Dagon, D.3
Edmonds, R.4
Lee, W.5
-
31
-
-
85061877313
-
Impeding automated malware analysis with environment-sensitive malware
-
Berkeley, CA, USA, USENIX Association
-
C. Song, P. Royal, and W. Lee. Impeding automated malware analysis with environment-sensitive malware. In Proceedings of the 7th USENIX conference on Hot Topics in Security, HotSec'12, pages 4-4, Berkeley, CA, USA, 2012. USENIX Association.
-
(2012)
Proceedings of the 7th USENIX conference on Hot Topics in Security, HotSec'12
, pp. 4-4
-
-
Song, C.1
Royal, P.2
Lee, W.3
-
32
-
-
77954608267
-
The multi-principal os construction of the gazelle web browser
-
USENIX Association
-
H. Wang, C. Grier, A. Moshchuk, S. King, P. Choudhury, and H. Venter. The multi-principal os construction of the gazelle web browser. In Proceedings of the 18th conference on USENIX security symposium, pages 417-432. USENIX Association, 2009.
-
(2009)
Proceedings of the 18th conference on USENIX security symposium
, pp. 417-432
-
-
Wang, H.1
Grier, C.2
Moshchuk, A.3
King, S.4
Choudhury, P.5
Venter, H.6
-
33
-
-
77950788046
-
Panorama: Capturing System-wide Information Flow for Malware Detection and Analysis
-
October
-
H. Yin, D. Song, M. Egele, C. Kruegel, and E. Kirda. Panorama: Capturing System-wide Information Flow for Malware Detection and Analysis. In Proceedings of the 14th ACM Conference of Computer and Communication Security, October 2007.
-
(2007)
Proceedings of the 14th ACM Conference of Computer and Communication Security
-
-
Yin, H.1
Song, D.2
Egele, M.3
Kruegel, C.4
Kirda, E.5
|