Towards Stealthy Malware Detection
暂无分享,去创建一个
[1] M Damashek,et al. Gauging Similarity with n-Grams: Language-Independent Categorization of Text , 1995, Science.
[2] Karl N. Levitt,et al. Execution monitoring of security-critical programs in distributed systems: a specification-based approach , 1997, Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097).
[3] George C. Necula,et al. Proof-carrying code , 1997, POPL '97.
[4] Barak A. Pearlmutter,et al. Detecting intrusions using system calls: alternative data models , 1999, Proceedings of the 1999 IEEE Symposium on Security and Privacy (Cat. No.99CB36344).
[5] Adi Shamir,et al. Playing "Hide and Seek" with Stored Keys , 1999, Financial Cryptography.
[6] R. M. Balzer,et al. Mediating connectors , 1999, Proceedings. 19th IEEE International Conference on Distributed Computing Systems. Workshops on Electronic Commerce and Web-based Applications. Middleware.
[7] Salvatore J. Stolfo,et al. Modeling system calls for intrusion detection with dynamic window sizes , 2001, Proceedings DARPA Information Survivability Conference and Exposition II. DISCEX'01.
[8] David A. Wagner,et al. Intrusion detection via static analysis , 2001, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001.
[9] Salvatore J. Stolfo,et al. USENIX Association Proceedings of the FREENIX Track : 2001 USENIX Annual , 2001 .
[10] Somesh Jha,et al. Detecting Manipulated Remote Call Streams , 2002, USENIX Security Symposium.
[11] R. Sekar,et al. Specification-based anomaly detection: a new approach for detecting network intrusions , 2002, CCS '02.
[12] Mohammad Hossain Heydari,et al. Content based file type detection algorithms , 2003, 36th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of the.
[13] Somesh Jha,et al. Static Analysis of Executables to Detect Malicious Patterns , 2003, USENIX Security Symposium.
[14] Salvatore J. Stolfo,et al. Anomalous Payload-Based Network Intrusion Detection , 2004, RAID.
[15] Angelos D. Keromytis,et al. Recursive Sandboxes: Extending Systrace To Empower Applications , 2004, SEC.
[16] Christopher Krügel,et al. Static Disassembly of Obfuscated Binaries , 2004, USENIX Security Symposium.
[17] Marcus A. Maloof,et al. Learning to detect malicious executables in the wild , 2004, KDD.
[18] Angelos D. Keromytis,et al. Detecting Targeted Attacks Using Shadow Honeypots , 2005, USENIX Security Symposium.
[19] Ke Wang,et al. Fileprints: identifying file types by n-gram analysis , 2005, Proceedings from the Sixth Annual IEEE SMC Information Assurance Workshop.
[20] Salvatore J. Stolfo,et al. Anomalous Payload-Based Worm Detection and Signature Generation , 2005, RAID.