UNVEIL: A large-scale, automated approach to detecting ransomware (keynote)
暂无分享,去创建一个
[1] Christopher Krügel,et al. Polymorphic Worm Detection Using Structural Information of Executables , 2005, RAID.
[2] Andrew H. Sung,et al. Static analyzer of vicious executables (SAVE) , 2004, 20th Annual Computer Security Applications Conference.
[3] Somesh Jha,et al. Semantics-aware malware detection , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).
[4] Salvatore J. Stolfo,et al. Baiting Inside Attackers Using Decoy Documents , 2009, SecureComm.
[5] Jianhua Lin,et al. Divergence measures based on the Shannon entropy , 1991, IEEE Trans. Inf. Theory.
[6] Alexandre Gazet,et al. Comparative analysis of various ransomware virii , 2010, Journal in Computer Virology.
[7] Heng Yin,et al. Panorama: capturing system-wide information flow for malware detection and analysis , 2007, CCS '07.
[8] A.H. Sung,et al. Polymorphic malicious executable scanner by API sequence analysis , 2004, Fourth International Conference on Hybrid Intelligent Systems (HIS'04).
[9] Takeo Hariu,et al. API Chaser: Anti-analysis Resistant Malware Analyzer , 2013, RAID.
[10] John C. Mitchell,et al. Characterizing Bots' Remote Control Behavior , 2007, DIMVA.
[11] Martina Lindorfer,et al. Detecting Environment-Sensitive Malware , 2011, RAID.
[12] Somesh Jha,et al. Mining specifications of malicious behavior , 2008, ISEC '08.
[13] Mattia Monga,et al. Detecting Self-mutating Malware Using Control-Flow Graph Matching , 2006, DIMVA.
[14] Ke Wang,et al. Fileprints: identifying file types by n-gram analysis , 2005, Proceedings from the Sixth Annual IEEE SMC Information Assurance Workshop.
[15] Stefan Savage,et al. Manufacturing compromise: the emergence of exploit-as-a-service , 2012, CCS.
[16] Herbert Bos,et al. Prudent Practices for Designing Malware Experiments: Status Quo and Outlook , 2012, 2012 IEEE Symposium on Security and Privacy.
[17] Christopher Krügel,et al. Effective and Efficient Malware Detection at the End Host , 2009, USENIX Security Symposium.
[18] Christopher Krügel,et al. Behavior-based Spyware Detection , 2006, USENIX Security Symposium.
[19] Ulrich Flegel,et al. Detection of Intrusions and Malware, and Vulnerability Assessment , 2012, Lecture Notes in Computer Science.
[20] Amit Vasudevan,et al. Cobra: fine-grained malware analysis using stealth localized-executions , 2006, 2006 IEEE Symposium on Security and Privacy (S&P'06).
[21] Christopher Krügel,et al. BareBox: efficient malware analysis on bare-metal , 2011, ACSAC '11.
[22] Sakir Sezer,et al. Evolution of ransomware , 2018, IET Networks.
[23] Eero P. Simoncelli,et al. Image quality assessment: from error visibility to structural similarity , 2004, IEEE Transactions on Image Processing.
[24] Leyla Bilge,et al. Cutting the Gordian Knot: A Look Under the Hood of Ransomware Attacks , 2015, DIMVA.
[25] Herbert Bos,et al. Research in Attacks, Intrusions, and Defenses , 2015, Lecture Notes in Computer Science.
[26] Ronald L. Rivest,et al. Honeywords: making password-cracking detectable , 2013, CCS.
[27] Christopher Krügel,et al. The power of procrastination: detection and mitigation of execution-stalling malicious code , 2011, CCS '11.
[28] Wouter Joosen,et al. Exposing the Lack of Privacy in File Hosting Services , 2011, LEET.
[29] Salvatore J. Stolfo,et al. Data mining methods for detection of new malicious executables , 2001, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001.
[30] Douglas C. Lovelace,et al. The cyber threat , 2015 .
[31] J. Yuill,et al. Honeyfiles: deceptive files for intrusion detection , 2004, Proceedings from the Fifth Annual IEEE SMC Information Assurance Workshop, 2004..
[32] Christopher Krügel,et al. BareCloud: Bare-metal Analysis-based Evasive Malware Detection , 2014, USENIX Security Symposium.
[33] Somesh Jha,et al. A Layered Architecture for Detecting Malicious Behaviors , 2008, RAID.