EFFICIENT STATIC ANALYSIS OF EXECUTABLES FOR DETECTING MALICIOUS BEHAVIORS
暂无分享,去创建一个
[1] K. Rozinov,et al. Reverse code engineering: an in-depth analysis of the Bagle virus , 2005, Proceedings from the Sixth Annual IEEE SMC Information Assurance Workshop.
[2] Declan Butler,et al. Dietary advice: Flash in the pan? , 2005, Nature.
[3] Andrew H. Sung,et al. Static analyzer of vicious executables (SAVE) , 2004, 20th Annual Computer Security Applications Conference.
[4] Tibor Gyimóthy,et al. Interprocedural static slicing of binary executables , 2003, Proceedings Third IEEE International Workshop on Source Code Analysis and Manipulation.
[5] Somesh Jha,et al. Static Analysis of Executables to Detect Malicious Patterns , 2003, USENIX Security Symposium.
[6] Weibo Gong,et al. Anomaly detection using call stack information , 2003, 2003 Symposium on Security and Privacy, 2003..
[7] Dennis Shasha,et al. GraphGrep: A fast and universal method for querying graphs , 2002, Object recognition supported by user interaction for service robots.
[8] Dawson R. Engler,et al. Using programmer-written compiler extensions to catch security holes , 2002, Proceedings 2002 IEEE Symposium on Security and Privacy.
[9] Brian Chess,et al. Improving computer security using extended static checking , 2002, Proceedings 2002 IEEE Symposium on Security and Privacy.
[10] R. Sekar,et al. A fast automaton-based method for detecting anomalous program behaviors , 2001, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001.
[11] Mourad Debbabi,et al. Static analysis of binary code to isolate malicious behaviors , 1999, Proceedings. IEEE 8th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE'99).
[12] Stephanie Forrest,et al. Intrusion Detection Using Sequences of System Calls , 1998, J. Comput. Secur..
[13] W C Wilson,et al. Activity Pattern Analysis by Means of Sequence-Alignment Methods , 1998 .
[14] Cristina Cifuentes,et al. Intraprocedural static slicing of binary executables , 1997, 1997 Proceedings International Conference on Software Maintenance.
[15] Mario Vento,et al. An efficient algorithm for the inexact matching of ARG graphs using a contextual transformational model , 1996, Proceedings of 13th International Conference on Pattern Recognition.
[16] William Landi,et al. Undecidability of static analysis , 1992, LOPL.
[17] F. Cohen. Computer viruses: Theory and experiments , 1987, Comput. Secur..
[18] K. J. Ottenstein,et al. The program dependence graph and its use in optimization , 1984, TOPL.
[19] Michael McGill,et al. A performance evaluation of similarity measures, document term weighting schemes and representations in a Boolean environment , 1980, SIGIR '80.
[20] rey O. Kephart,et al. Automatic Extraction of Computer Virus SignaturesJe , 2006 .
[21] Shih-Fu Chang,et al. Stochastic Attributed Relational Graph Matching for Image Near-Duplicate Detection , 2004 .
[22] Matt Pietrek,et al. An in-depth look into the win32 portable executable le format , 2002 .
[23] R. Rivest,et al. Introduction to Algorithms, Second Edition , 2001 .
[24] Steve R. White,et al. An Undetectable Computer Virus , 2000 .
[25] Authoring content , 1999 .
[26] Peter G. Neumann,et al. EMERALD: Event Monitoring Enabling Responses to Anomalous Live Disturbances , 1997, CCS 2002.
[27] Matt Bishop,et al. Checking for Race Conditions in File Accesses , 1996, Comput. Syst..
[28] M R Belsheim,et al. A flash in the pan. , 1981, Canadian Medical Association journal.
[29] Robert E. Tarjan,et al. A fast algorithm for finding dominators in a flowgraph , 1979, TOPL.
[30] Susan Horwitz,et al. Interprocedural slicing using dependence graphs , 1988, SIGP.