Watch Your Back: Identifying Cybercrime Financial Relationships in Bitcoin through Back-and-Forth Exploration | 0 | 0.34 | 2022 |
A Survey of Binary Code Similarity | 0 | 0.34 | 2021 |
How Did That Get In My Phone? Unwanted App Distribution on Android Devices | 1 | 0.34 | 2021 |
Cross-Origin State Inference (COSI) Attacks: Leaking Web Site States through XS-Leaks | 1 | 0.35 | 2020 |
Towards Attribution in Mobile Markets: Identifying Developer Account Polymorphism | 0 | 0.34 | 2020 |
AVClass2: Massive Malware Tag Extraction from AV Labels | 2 | 0.36 | 2020 |
Costly freeware: a systematic analysis of abuse in download portals. | 0 | 0.34 | 2019 |
Mind Your Own Business - A Longitudinal Study of Threats and Vulnerabilities in Enterprises. | 0 | 0.34 | 2019 |
BCD: Decomposing Binary Code Into Components Using Graph-Based Clustering. | 2 | 0.36 | 2018 |
Malware Lineage in the Wild. | 1 | 0.36 | 2018 |
The MalSource Dataset: Quantifying Complexity and Code Reuse in Malware Development. | 1 | 0.35 | 2018 |
Coming of Age: A Longitudinal Study of TLS Deployment. | 4 | 0.44 | 2018 |
K-Hunt: Pinpointing Insecure Cryptographic Keys from Execution Traces. | 2 | 0.36 | 2018 |
A Lustrum of Malware Network Communication: Evolution and Insights | 12 | 0.59 | 2017 |
Dissecting Tor Bridges: A Security Evaluation of their Private and Public Infrastructures. | 0 | 0.34 | 2017 |
Measuring Pup Prevalence And Pup Distribution Through Pay-Per-Install Services | 12 | 0.72 | 2016 |
RevProbe: detecting silent reverse proxies in malicious server infrastructures. | 1 | 0.36 | 2016 |
Type Inference on Executables. | 9 | 0.51 | 2016 |
Certified PUP: Abuse in Authenticode Code Signing | 11 | 0.73 | 2015 |
The MALICIA dataset: identification and analysis of drive-by download operations | 11 | 0.70 | 2015 |
Ayudante: identifying undesired variable interactions | 2 | 0.39 | 2015 |
CARONTE: Detecting Location Leaks for Deanonymizing Tor Hidden Services | 12 | 0.67 | 2015 |
The Attack of the Clones: A Study of the Impact of Shared Code on Vulnerability Patching | 29 | 1.32 | 2015 |
CyberProbe: Towards Internet-Scale Active Detection of Malicious Servers. | 0 | 0.34 | 2014 |
Network dialog minimization and network dialog diffing: two novel primitives for network security applications. | 2 | 0.37 | 2014 |
AUTOPROBE: Towards Automatic Active Malicious Server Probing Using Dynamic Binary Analysis | 8 | 0.50 | 2014 |
WhoWas: A Platform for Measuring Web Deployments on IaaS Clouds | 6 | 0.53 | 2014 |
Automatic protocol reverse-engineering: Message format extraction and field semantics inference | 18 | 1.06 | 2013 |
Can machine learning techniques help to improve the common fisheries policy? | 1 | 0.38 | 2013 |
Cross-platform malware: write once, infect everywhere. | 0 | 0.34 | 2013 |
Firma: Malware Clustering And Network Signature Generation With Mixed Network Behaviors | 18 | 0.74 | 2013 |
Driving in the cloud: an analysis of drive-by download operations and abuse reporting | 40 | 1.32 | 2013 |
Manufacturing compromise: the emergence of exploit-as-a-service | 98 | 3.62 | 2012 |
Understanding The Role Of Malware In Cybercrime | 0 | 0.34 | 2012 |
Undangle: early detection of dangling pointers in use-after-free and double-free vulnerabilities | 26 | 0.83 | 2012 |
Kaviar: an accessible system for testing SNV novelty. | 6 | 0.59 | 2011 |
Measuring pay-per-install: the commoditization of malware distribution | 101 | 5.22 | 2011 |
Differential Slicing: Identifying Causal Execution Differences for Security Applications | 34 | 1.05 | 2011 |
Input generation via decomposition and re-stitching: finding bugs in Malware | 27 | 1.46 | 2010 |
Insights from the inside: a view of botnet management from infiltration | 37 | 2.10 | 2010 |
Binary Code Extraction and Interface Identification for Security Applications. | 56 | 2.53 | 2010 |
Dispatcher: enabling active botnet infiltration using automatic protocol reverse-engineering | 95 | 3.66 | 2009 |
Towards Generating High Coverage Vulnerability-Based Signatures with Protocol-Level Constraint-Guided Exploration | 14 | 0.74 | 2009 |
Secure Content Sniffing for Web Browsers, or How to Stop Papers from Reviewing Themselves | 38 | 2.56 | 2009 |
Enhancing gene detection with computer generated intergenic regions | 0 | 0.34 | 2009 |
BitBlaze: A New Approach to Computer Security via Binary Analysis | 325 | 10.14 | 2008 |
Would Diversity Really Increase the Robustness of the Routing Infrastructure against Software Defects? | 7 | 0.53 | 2008 |
Distributed Evasive Scan Techniques and Countermeasures | 20 | 1.35 | 2007 |
Towards automatic discovery of deviations in binary implementations with applications to error detection and fingerprint generation | 56 | 4.39 | 2007 |
Polyglot: automatic extraction of protocol message format using dynamic binary analysis | 157 | 7.47 | 2007 |