-
1
-
-
84866362135
-
STRIDE: Polymorphic sled detection through instruction sequence analysis
-
P. Akritidis, E. Markatos, M. Polychronakis, and K. Anagnostakis. STRIDE: Polymorphic sled detection through instruction sequence analysis. In 20th International Conference on Information Security, pages 375-392, 2005.
-
(2005)
20th International Conference on Information Security
, pp. 375-392
-
-
Akritidis, P.1
Markatos, E.2
Polychronakis, M.3
Anagnostakis, K.4
-
2
-
-
78049530550
-
The security of machine learning
-
M. Barreno, B. Nelson, A. Joseph, and J. Tygar. The security of machine learning. Machine Learning, 81(2):121-148, 2010.
-
(2010)
Machine Learning
, vol.81
, Issue.2
, pp. 121-148
-
-
Barreno, M.1
Nelson, B.2
Joseph, A.3
Tygar, J.4
-
3
-
-
33845989821
-
Can machine learning be secure?
-
M. Barreno, B. Nelson, R. Sears, A. Joseph, and J. Tygar. Can machine learning be secure? In ACM Symposium on Information, Computer and Communication Security, pages 16-25, 2006.
-
(2006)
ACM Symposium on Information, Computer and Communication Security
, pp. 16-25
-
-
Barreno, M.1
Nelson, B.2
Sears, R.3
Joseph, A.4
Tygar, J.5
-
6
-
-
84873447654
-
Prophiler: a fast filter for the large-scale detection of malicious web pages
-
D. Canali, M. Cova, G. Vigna, and C. Kruegel. Prophiler: a fast filter for the large-scale detection of malicious web pages. In International Conference on World Wide Web (WWW), pages 197-206, 2011.
-
(2011)
International Conference on World Wide Web (WWW)
, pp. 197-206
-
-
Canali, D.1
Cova, M.2
Vigna, G.3
Kruegel, C.4
-
8
-
-
34249753618
-
Support vector networks
-
C. Cortes and V. Vapnik. Support vector networks. Machine Learning, 20:273-297, 1995.
-
(1995)
Machine Learning
, vol.20
, pp. 273-297
-
-
Cortes, C.1
Vapnik, V.2
-
10
-
-
85076498355
-
ZOZ-ZLE: Fast and precise in-browser JavaScript malware detection
-
C. Curtsinger, B. Livshits, B. Zorn, and C. Seifert. ZOZ-ZLE: Fast and precise in-browser JavaScript malware detection. In USENIX Security Symposium, pages 33-48, 2011.
-
(2011)
USENIX Security Symposium
, pp. 33-48
-
-
Curtsinger, C.1
Livshits, B.2
Zorn, B.3
Seifert, C.4
-
12
-
-
85061529860
-
BotHunter: Detecting malware infection through IDS-driven dialog correlation
-
G. Gu, P. Porras, V. Yegneswaran, M. Fong, and W. Lee. BotHunter: Detecting malware infection through IDS-driven dialog correlation. In USENIX Security Symposium, pages 167-182, 2007.
-
(2007)
USENIX Security Symposium
, pp. 167-182
-
-
Gu, G.1
Porras, P.2
Yegneswaran, V.3
Fong, M.4
Lee, W.5
-
14
-
-
0003684449
-
The Elements of Statistical Learning: data mining, inference and prediction
-
Springer, New York, N.Y., 2nd edition
-
T. Hastie, R. Tibshirani, and J. Friedman. The Elements of Statistical Learning: data mining, inference and prediction. Springer series in statistics. Springer, New York, N.Y., 2009. 2nd edition.
-
(2009)
Springer series in statistics
-
-
Hastie, T.1
Tibshirani, R.2
Friedman, J.3
-
16
-
-
84876950829
-
Abusing file processing in malware detectors for fun and profit
-
S. Jana and V. Shmatikov. Abusing file processing in malware detectors for fun and profit. In IEEE Symposium on Security and Privacy, pages 80-94, 2012.
-
(2012)
IEEE Symposium on Security and Privacy
, pp. 80-94
-
-
Jana, S.1
Shmatikov, V.2
-
17
-
-
84868148438
-
-
Technical report, Microsoft Research
-
S. Kaplan, B. Livshits, B. Zorn, C. Siefert, and C. Cursinger. “nofus: Automatically detecting” + string.fromcharcode(32) + “obfuscated”.tolowercase() + “javascript code”. Technical report, Microsoft Research, 2011.
-
(2011)
nofus: Automatically detecting” + string.fromcharcode(32) + “obfuscated”.tolowercase() + “javascript code
-
-
Kaplan, S.1
Livshits, B.2
Zorn, B.3
Siefert, C.4
Cursinger, C.5
-
18
-
-
74049158178
-
A framework for quantitative security analysis of machine learning
-
Nov
-
P. Laskov and M. Kloft. A framework for quantitative security analysis of machine learning. In Proceedings of the 2nd ACM Workshop on AISec, pages 1-4, Nov. 2009.
-
(2009)
Proceedings of the 2nd ACM Workshop on AISec
, pp. 1-4
-
-
Laskov, P.1
Kloft, M.2
-
20
-
-
84940104123
-
A data mining framework for building intrusion detection models
-
W. Lee, S. Stolfo, and K. Mok. A data mining framework for building intrusion detection models. In IEEE Symposium on Security and Privacy, pages 120-132, 1999.
-
(1999)
IEEE Symposium on Security and Privacy
, pp. 120-132
-
-
Lee, W.1
Stolfo, S.2
Mok, K.3
-
21
-
-
38049030703
-
A study of malcode-bearing documents
-
W.-J. Li, S. Stolfo, A. Stavrou, E. Androulaki, and A. Keromytis. A study of malcode-bearing documents. In Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA), pages 231-250, 2007.
-
(2007)
Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA)
, pp. 231-250
-
-
Li, W.-J.1
Stolfo, S.2
Stavrou, A.3
Androulaki, E.4
Keromytis, A.5
-
25
-
-
85180411540
-
-
PDF Reference. http://www.adobe.com/devnet/pdf/pdf reference.html, 2008.
-
(2008)
PDF Reference
-
-
-
27
-
-
80053650188
-
All your iFRAMEs point to us
-
N. Provos, P. Mavrommatis, M. Abu Rajab, and F. Monrose. All your iFRAMEs point to us. In USENIX Security Symposium, pages 1-16, 2008.
-
(2008)
USENIX Security Symposium
, pp. 1-16
-
-
Provos, N.1
Mavrommatis, P.2
Abu Rajab, M.3
Monrose, F.4
-
30
-
-
49949090311
-
Learning and classification of malware behavior
-
July
-
K. Rieck, T. Holz, K. Willems, P. Düssel, and P. Laskov. Learning and classification of malware behavior. In Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA), 5th International Conference, pages 108-125, July 2008.
-
(2008)
Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA), 5th International Conference
, pp. 108-125
-
-
Rieck, K.1
Holz, T.2
Willems, K.3
Düssel, P.4
Laskov, P.5
-
36
-
-
84958963167
-
Accurate buffer overflow detection via abstract payload execution
-
T. Toth and C. Kruegel. Accurate buffer overflow detection via abstract payload execution. In Recent Adances in Intrusion Detection (RAID), pages 274-291, 2002.
-
(2002)
Recent Adances in Intrusion Detection (RAID)
, pp. 274-291
-
-
Toth, T.1
Kruegel, C.2
-
38
-
-
34047110218
-
CWSandbox: Towards automated dynamic binary analysis
-
C. Willems, T. Holz, and F. Freiling. CWSandbox: Towards automated dynamic binary analysis. IEEE Security and Privacy, 5(2):32-39, 2007.
-
(2007)
IEEE Security and Privacy
, vol.5
, Issue.2
, pp. 32-39
-
-
Willems, C.1
Holz, T.2
Freiling, F.3
|