A View on Current Malware Behaviors
暂无分享,去创建一个
Engin Kirda | Davide Balzarotti | Ulrich Bayer | Imam Habibi | E. Kirda | D. Balzarotti | Imam Habibi | Ulrich Bayer
[1] Vinod Yegneswaran,et al. BotHunter: Detecting Malware Infection Through IDS-Driven Dialog Correlation , 2007, USENIX Security Symposium.
[2] Tavis Ormandy. An Empirical Study into the Security Exposure to Hosts of Hostile Virtualized Environments Tavis , 2007 .
[3] Christopher Krügel,et al. Scalable, Behavior-Based Malware Clustering , 2009, NDSS.
[4] Niels Provos,et al. Ghost Turns Zombie: Exploring the Life Cycle of Web-based Malware , 2008, LEET.
[5] Felix C. Freiling,et al. The Nepenthes Platform: An Efficient Approach to Collect Malware , 2006, RAID.
[6] Heng Yin,et al. Panorama: capturing system-wide information flow for malware detection and analysis , 2007, CCS '07.
[7] David Moore,et al. Code-Red: a case study on the spread and victims of an internet worm , 2002, IMW '02.
[8] Somesh Jha,et al. Static Analysis of Executables to Detect Malicious Patterns , 2003, USENIX Security Symposium.
[9] Heng Yin,et al. Dynamic Spyware Analysis , 2007, USENIX Annual Technical Conference.
[10] Peter Ferrie. Attacks on More Virtual Machine Emulators , 2007 .
[11] Andreas Terzis,et al. A multifaceted approach to understanding the botnet phenomenon , 2006, IMC '06.
[12] Niels Provos,et al. All Your iFRAMEs Point to Us , 2008, USENIX Security Symposium.
[13] L. Spitzner,et al. Honeypots: Tracking Hackers , 2002 .
[14] Fabrice Bellard,et al. QEMU, a Fast and Portable Dynamic Translator , 2005, USENIX Annual Technical Conference, FREENIX Track.
[15] Steven D. Gribble,et al. A Crawler-based Study of Spyware in the Web , 2006, NDSS.
[16] U. Bayer,et al. TTAnalyze: A Tool for Analyzing Malware , 2006 .