Glyph: Efficient ML-Based Detection of Heap Spraying Attacks | 0 | 0.34 | 2021 |
POW-HOW: An Enduring Timing Side-Channel to Evade Online Malware Sandboxes | 0 | 0.34 | 2021 |
Editorial: Advanced Techniques for Memory Forensics Analysis. | 0 | 0.34 | 2020 |
Towards a Theory of Special-Purpose Program Obfuscation | 0 | 0.34 | 2020 |
Sec-Lib: Protecting Scholarly Digital Libraries From Infected Papers Using Active Machine Learning Framework | 0 | 0.34 | 2019 |
BootKeeper - Validating Software Integrity Properties on Boot Firmware Images. | 0 | 0.34 | 2019 |
Detecting (absent) app-to-app authentication on cross-device short-distance channels | 0 | 0.34 | 2019 |
Security Evaluation of a Banking Fraud Analysis System. | 0 | 0.34 | 2018 |
Epic: A Methodology For Evaluating Privacy Violation Risk In Cybersecurity Systems | 0 | 0.34 | 2018 |
The Privacy Implications of Cyber Security Systems: A Technological Survey. | 7 | 0.46 | 2018 |
ClickShield: Are You Hiding Something? Towards Eradicating Clickjacking on Android. | 0 | 0.34 | 2018 |
Prometheus: Analyzing WebInject-based information stealers. | 3 | 0.41 | 2017 |
Formal Verification of ARP (Address Resolution Protocol) Through SMT-Based Model Checking - A Case Study -. | 0 | 0.34 | 2017 |
Scholarly Digital Libraries as a Platform for Malware Distribution. | 0 | 0.34 | 2017 |
A Security Game Model for Remote Software Protection | 0 | 0.34 | 2016 |
Micro-Virtualization Memory Tracing To Detect And Prevent Spraying Attacks | 0 | 0.34 | 2016 |
Measuring the Role of Greylisting and Nolisting in Fighting Spam | 1 | 0.37 | 2016 |
Subverting Operating System Properties Through Evolutionary DKOM Attacks. | 5 | 0.47 | 2016 |
Needles in a Haystack: Mining Information from Public Dynamic Analysis Sandboxes for Malware Intelligence | 12 | 0.55 | 2015 |
On the feasibility of software attacks on commodity virtual machine monitors via direct device assignment | 9 | 0.53 | 2014 |
Improving Mac OS X security through gray box fuzzing technique | 1 | 0.63 | 2014 |
Hypervisor Memory Forensics | 3 | 0.41 | 2013 |
PeerRush: Mining for unwanted P2P traffic. | 20 | 0.90 | 2013 |
A quantitative study of accuracy in system call-based malware detection | 53 | 1.50 | 2012 |
Thwarting real-time dynamic unpacking | 2 | 0.41 | 2011 |
Operating system interface obfuscation and the revealing of hidden operations | 11 | 0.59 | 2011 |
AccessMiner: using system-centric models for malware protection | 71 | 2.61 | 2010 |
G-Free: defeating return-oriented programming through gadget-less binaries | 108 | 3.98 | 2010 |
K-Tracer: A System for Extracting Kernel Malware Behavior | 56 | 2.29 | 2009 |
Automatic Reverse Engineering of Malware Emulators | 87 | 2.95 | 2009 |
Secure in-VM monitoring using hardware virtualization | 131 | 4.40 | 2009 |
Impeding Malware Analysis Using Conditional Code Obfuscation | 91 | 2.66 | 2008 |
System Call API Obfuscation (Extended Abstract) | 8 | 0.51 | 2008 |
LISABETH: automated content-based signature generator for zero-day polymorphic worms | 20 | 1.01 | 2008 |
Classification of packed executables for accurate computer virus detection | 68 | 3.13 | 2008 |
An Efficient Technique For Preventing Mimicry And Impossible Paths Execution Attacks | 8 | 0.53 | 2007 |
Diversified Process Replicae For Defeating Memory Error Exploits | 30 | 1.41 | 2007 |
A Smart Fuzzer for x86 Executables | 13 | 1.08 | 2007 |
Static Analysis on x86 Executables for Preventing Automatic Mimicry Attacks | 1 | 0.35 | 2007 |
A protocol for anonymous and accurate e-polling | 4 | 0.85 | 2005 |
Replay Attack in TCG Specification and Solution | 22 | 1.28 | 2005 |