AVclass: A Tool for Massive Malware Labeling
暂无分享,去创建一个
Juan Caballero | Richard Rivera | Marcos Sebastián | Platon Kotzias | Juan Caballero | Platon Kotzias | Marcos Sebastián | Richard Rivera
[1] Julio Canto,et al. Large scale malware collection : lessons learned , 2008 .
[2] Yajin Zhou,et al. Dissecting Android Malware: Characterization and Evolution , 2012, 2012 IEEE Symposium on Security and Privacy.
[3] Juan Caballero,et al. Certified PUP: Abuse in Authenticode Code Signing , 2015, CCS.
[4] Ling Huang,et al. Reviewer Integration and Performance Measurement for Malware Detection , 2015, DIMVA.
[5] Farnam Jahanian,et al. CloudAV: N-Version Antivirus in the Network Cloud , 2008, USENIX Security Symposium.
[6] Michael Carl Tschantz,et al. Better Malware Ground Truth: Techniques for Weighting Anti-Virus Vendor Labels , 2015, AISec@CCS.
[7] David Brumley,et al. BitShred: feature hashing malware for scalable triage and semantic analysis , 2011, CCS '11.
[8] Stefano Zanero,et al. Finding Non-trivial Malware Naming Inconsistencies , 2011, ICISS.
[9] Zhuoqing Morley Mao,et al. Automated Classification and Analysis of Internet Malware , 2007, RAID.
[10] Steve Steiner. Naming conventions , 1990 .
[11] Juan Caballero,et al. FIRMA: Malware Clustering and Network Signature Generation with Mixed Network Behaviors , 2013, RAID.
[12] Wenke Lee,et al. McBoost: Boosting Scalability in Malware Collection and Analysis Using Statistical Classification of Executables , 2008, 2008 Annual Computer Security Applications Conference (ACSAC).
[13] David Harley,et al. A DOSE BY ANY OTHER NAME , 2008 .
[14] Peng Li,et al. On Challenges in Evaluating Malware Clustering , 2010, RAID.
[15] Carsten Willems,et al. Learning and Classification of Malware Behavior , 2008, DIMVA.
[16] Konrad Rieck,et al. DREBIN: Effective and Explainable Detection of Android Malware in Your Pocket , 2014, NDSS.
[17] Roberto Perdisci,et al. VAMO: towards a fully automated malware clustering validity analysis , 2012, ACSAC '12.
[18] Nick Feamster,et al. Behavioral Clustering of HTTP-Based Malware and Signature Generation Using Malicious Network Traces , 2010, NSDI.
[19] Stephen Mason,et al. A study of the relationship between antivirus regressions and label changes , 2013, 2013 IEEE 24th International Symposium on Software Reliability Engineering (ISSRE).
[20] Chao Yang,et al. DroidMiner: Automated Mining and Characterization of Fine-grained Malicious Behaviors in Android Applications , 2014, ESORICS.
[21] Carsten Willems,et al. Automatic analysis of malware behavior using machine learning , 2011, J. Comput. Secur..
[22] Aziz Mohaisen,et al. AV-Meter: An Evaluation of Antivirus Scans and Labels , 2014, DIMVA.
[23] Christopher Krügel,et al. Scalable, Behavior-Based Malware Clustering , 2009, NDSS.
[24] Jacques Klein,et al. On the Lack of Consensus in Anti-Virus Decisions: Metrics and Insights on Building Ground Truths of Android Malware , 2016, DIMVA.
[25] Juan Caballero,et al. The MALICIA dataset: identification and analysis of drive-by download operations , 2014, International Journal of Information Security.
[26] Yanick Fratantonio,et al. ANDRUBIS -- 1,000,000 Apps Later: A View on Current Android Malware Behaviors , 2014, 2014 Third International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security (BADGERS).
[27] Jack W. Stokes,et al. Large-scale malware classification using random projections and neural networks , 2013, 2013 IEEE International Conference on Acoustics, Speech and Signal Processing.
[28] Wenyi Huang,et al. MtNet: A Multi-Task Neural Network for Dynamic Malware Classification , 2016, DIMVA.
[29] Dan Arp,et al. Drebin : � Efficient and Explainable Detection of Android Malware in Your Pocket , 2014 .
[30] Niels Provos,et al. CAMP: Content-Agnostic Malware Protection , 2013, NDSS.