Dynamic Spyware Analysis
暂无分享,去创建一个
Heng Yin | Dawn Xiaodong Song | Christopher Krügel | Engin Kirda | Manuel Egele | D. Song | Christopher Krügel | E. Kirda | Heng Yin | Manuel Egele
[1] Robert E. Tarjan,et al. A fast algorithm for finding dominators in a flowgraph , 1979, TOPL.
[2] Clark Thomborson,et al. Manufacturing cheap, resilient, and stealthy opaque constructs , 1998, POPL '98.
[3] Gregory Wroblewski,et al. General Method of Program Code Obfuscation , 2002 .
[4] Samuel T. King,et al. ReVirt: enabling intrusion analysis through virtual-machine logging and replay , 2002, OPSR.
[5] Samuel T. King,et al. Backtracking intrusions , 2003, SOSP '03.
[6] Tal Garfinkel,et al. A Virtual Machine Introspection Based Architecture for Intrusion Detection , 2003, NDSS.
[7] Saumya K. Debray,et al. Obfuscation of executable code to improve resistance to static disassembly , 2003, CCS '03.
[8] Stefan Saroiu,et al. Measurement and analysis of spywave in a university environment , 2004 .
[9] Christopher Krügel,et al. Detecting kernel-level rootkits through binary analysis , 2004, 20th Annual Computer Security Applications Conference.
[10] Stefan Saroiu,et al. Measurement and Analysis of Spyware in a University Environment , 2004, NSDI.
[11] Somesh Jha,et al. Testing malware detectors , 2004, ISSTA '04.
[12] Frederic T. Chong,et al. Minos: Control Data Attack Prevention Orthogonal to Memory Model , 2004, 37th International Symposium on Microarchitecture (MICRO-37'04).
[13] Christopher Krügel,et al. Static Disassembly of Obfuscated Binaries , 2004, USENIX Security Symposium.
[14] Tal Garfinkel,et al. Understanding data lifetime via whole system simulation , 2004 .
[15] Sy-Yen Kuo,et al. Gatekeeper: Monitoring Auto-Start Extensibility Points (ASEPs) for Spyware Management , 2004, LISA.
[16] Somesh Jha,et al. Semantics-aware malware detection , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).
[17] James Newsome,et al. Dynamic Taint Analysis for Automatic Detection, Analysis, and SignatureGeneration of Exploits on Commodity Software , 2005, NDSS.
[18] Samuel T. King,et al. Backtracking intrusions , 2005, TOCS.
[19] Samuel T. King,et al. Detecting past and present intrusions through vulnerability-specific predicates , 2005, SOSP '05.
[20] Roger Thompson,et al. Why spyware poses multiple threats to security , 2005, CACM.
[21] Fabrice Bellard,et al. QEMU, a Fast and Portable Dynamic Translator , 2005, USENIX Annual Technical Conference, FREENIX Track.
[22] Miguel Castro,et al. Vigilante: end-to-end containment of internet worms , 2005, SOSP '05.
[23] Christopher Krügel,et al. Behavior-based Spyware Detection , 2006, USENIX Security Symposium.
[24] Herbert Bos,et al. Argos: an emulator for fingerprinting zero-day attacks for advertised honeypots with automatic signature generation , 2006, EuroSys.
[25] Andrew Warfield,et al. Practical taint-based protection using demand emulation , 2006, EuroSys.
[26] Steven D. Gribble,et al. A Crawler-based Study of Spyware in the Web , 2006, NDSS.
[27] Xuxian Jiang,et al. Automated Web Patrol with Strider HoneyMonkeys: Finding Web Sites That Exploit Browser Vulnerabilities , 2006, NDSS.