EFFICIENT STATIC ANALYSIS OF EXECUTABLES FOR DETECTING MALICIOUS BEHAVIORS

[1]  K. Rozinov,et al.  Reverse code engineering: an in-depth analysis of the Bagle virus , 2005, Proceedings from the Sixth Annual IEEE SMC Information Assurance Workshop.

[2]  Declan Butler,et al.  Dietary advice: Flash in the pan? , 2005, Nature.

[3]  Andrew H. Sung,et al.  Static analyzer of vicious executables (SAVE) , 2004, 20th Annual Computer Security Applications Conference.

[4]  Tibor Gyimóthy,et al.  Interprocedural static slicing of binary executables , 2003, Proceedings Third IEEE International Workshop on Source Code Analysis and Manipulation.

[5]  Somesh Jha,et al.  Static Analysis of Executables to Detect Malicious Patterns , 2003, USENIX Security Symposium.

[6]  Weibo Gong,et al.  Anomaly detection using call stack information , 2003, 2003 Symposium on Security and Privacy, 2003..

[7]  Dennis Shasha,et al.  GraphGrep: A fast and universal method for querying graphs , 2002, Object recognition supported by user interaction for service robots.

[8]  Dawson R. Engler,et al.  Using programmer-written compiler extensions to catch security holes , 2002, Proceedings 2002 IEEE Symposium on Security and Privacy.

[9]  Brian Chess,et al.  Improving computer security using extended static checking , 2002, Proceedings 2002 IEEE Symposium on Security and Privacy.

[10]  R. Sekar,et al.  A fast automaton-based method for detecting anomalous program behaviors , 2001, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001.

[11]  Mourad Debbabi,et al.  Static analysis of binary code to isolate malicious behaviors , 1999, Proceedings. IEEE 8th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE'99).

[12]  Stephanie Forrest,et al.  Intrusion Detection Using Sequences of System Calls , 1998, J. Comput. Secur..

[13]  W C Wilson,et al.  Activity Pattern Analysis by Means of Sequence-Alignment Methods , 1998 .

[14]  Cristina Cifuentes,et al.  Intraprocedural static slicing of binary executables , 1997, 1997 Proceedings International Conference on Software Maintenance.

[15]  Mario Vento,et al.  An efficient algorithm for the inexact matching of ARG graphs using a contextual transformational model , 1996, Proceedings of 13th International Conference on Pattern Recognition.

[16]  William Landi,et al.  Undecidability of static analysis , 1992, LOPL.

[17]  F. Cohen Computer viruses: Theory and experiments , 1987, Comput. Secur..

[18]  K. J. Ottenstein,et al.  The program dependence graph and its use in optimization , 1984, TOPL.

[19]  Michael McGill,et al.  A performance evaluation of similarity measures, document term weighting schemes and representations in a Boolean environment , 1980, SIGIR '80.

[20]  rey O. Kephart,et al.  Automatic Extraction of Computer Virus SignaturesJe , 2006 .

[21]  Shih-Fu Chang,et al.  Stochastic Attributed Relational Graph Matching for Image Near-Duplicate Detection , 2004 .

[22]  Matt Pietrek,et al.  An in-depth look into the win32 portable executable le format , 2002 .

[23]  R. Rivest,et al.  Introduction to Algorithms, Second Edition , 2001 .

[24]  Steve R. White,et al.  An Undetectable Computer Virus , 2000 .

[25]  Authoring content , 1999 .

[26]  Peter G. Neumann,et al.  EMERALD: Event Monitoring Enabling Responses to Anomalous Live Disturbances , 1997, CCS 2002.

[27]  Matt Bishop,et al.  Checking for Race Conditions in File Accesses , 1996, Comput. Syst..

[28]  M R Belsheim,et al.  A flash in the pan. , 1981, Canadian Medical Association journal.

[29]  Robert E. Tarjan,et al.  A fast algorithm for finding dominators in a flowgraph , 1979, TOPL.

[30]  Susan Horwitz,et al.  Interprocedural slicing using dependence graphs , 1988, SIGP.