Detection of Intrusions and Malware, and Vulnerability Assessment
暂无分享,去创建一个
Cristiano Giuffrida | Gregory Blanc | Sébastien Bardin | Cristiano Giuffrida | Grégory Blanc | S. Bardin
[1] Chi-Sung Laih,et al. Malware Virtualization-Resistant Behavior Detection , 2011, 2011 IEEE 17th International Conference on Parallel and Distributed Systems.
[2] Bernhard Plattner,et al. Large-scale vulnerability analysis , 2006, LSAD '06.
[3] Lorenzo Martignoni,et al. Testing CPU emulators , 2009, ISSTA.
[4] Herbert Bos,et al. Large-Scale Analysis of Malware Downloaders , 2012, DIMVA.
[5] Martina Lindorfer,et al. Detecting Environment-Sensitive Malware , 2011, RAID.
[6] Christopher Krügel,et al. BareDroid: Large-Scale Analysis of Android Apps on Real Devices , 2015, ACSAC 2015.
[7] Tsutomu Matsumoto,et al. SandPrint: Fingerprinting Malware Sandboxes to Provide Intelligence for Sandbox Evasion , 2016, RAID.
[8] Levente Buttyán,et al. nEther: in-guest detection of out-of-the-guest malware analyzers , 2011, EUROSEC '11.
[9] Christopher Krügel,et al. Detecting System Emulators , 2007, ISC.
[10] Tilo Müller,et al. Divide-and-Conquer: Why Android Malware Cannot Be Stopped , 2014, 2014 Ninth International Conference on Availability, Reliability and Security.
[11] Michalis Polychronakis,et al. Spotless Sandboxes: Evading Malware Analysis Systems Using Wear-and-Tear Artifacts , 2017, 2017 IEEE Symposium on Security and Privacy (SP).
[12] Amit Vasudevan,et al. Cobra: fine-grained malware analysis using stealth localized-executions , 2006, 2006 IEEE Symposium on Security and Privacy (S&P'06).
[13] Konrad Rieck,et al. Botzilla: detecting the "phoning home" of malicious software , 2010, SAC '10.
[14] Nicolas Christin,et al. Evading android runtime analysis via sandbox detection , 2014, AsiaCCS.
[15] Ping Chen,et al. A Study on Advanced Persistent Threats , 2014, Communications and Multimedia Security.
[16] Carsten Willems,et al. Automatic analysis of malware behavior using machine learning , 2011, J. Comput. Secur..
[17] Lorenzo Martignoni,et al. A Fistful of Red-Pills: How to Automatically Generate Procedures to Detect CPU Emulators , 2009, WOOT.
[18] Sotiris Ioannidis,et al. Rage against the virtual machine: hindering dynamic analysis of Android malware , 2014, EuroSec '14.
[19] Wouter Joosen,et al. PriVaricator: Deceiving Fingerprinters with Little White Lies , 2015, WWW.
[20] Christopher Krügel,et al. Exploring Multiple Execution Paths for Malware Analysis , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).
[21] Christopher Krügel,et al. AccessMiner: using system-centric models for malware protection , 2010, CCS '10.
[22] Christian Platzer,et al. Detecting malware's failover C&C strategies with squeeze , 2011, ACSAC '11.
[23] Mauro Conti,et al. Mirage: Toward a Stealthier and Modular Malware Analysis Sandbox for Android , 2017, ESORICS.
[24] Yashwant K. Malaiya,et al. Defining and Assessing Quantitative Security Risk Measures Using Vulnerability Lifecycle and CVSS Metrics , 2011 .