Transcending TRANSCEND: Revisiting Malware Classification in the Presence of Concept Drift | 0 | 0.34 | 2022 |
Dos and Don'ts of Machine Learning in Computer Security | 0 | 0.34 | 2022 |
INSOMNIA: Towards Concept-Drift Robustness in Network Intrusion Detection | 3 | 0.37 | 2021 |
Investigating Labelless Drift Adaptation for Malware Detection | 1 | 0.35 | 2021 |
Probabilistic Naming of Functions in Stripped Binaries. | 0 | 0.34 | 2020 |
On The Dissection Of Evasive Malware | 0 | 0.34 | 2020 |
Intriguing Properties of Adversarial ML Attacks in the Problem Space | 9 | 0.57 | 2020 |
SoK - Using Dynamic Binary Instrumentation for Security (And How You May Get Caught Red Handed). | 4 | 0.42 | 2019 |
Tesseract: Eliminating Experimental Bias In Malware Classification Across Space And Time | 1 | 0.37 | 2018 |
Session details: Session 8D: Binary Defenses 2 | 0 | 0.34 | 2018 |
Enabling Fair ML Evaluations for Security | 0 | 0.34 | 2018 |
Anomaly-based exploratory analysis and detection of exploits in android mediaserver. | 0 | 0.34 | 2018 |
Reprint of "You can't touch this: Consumer-centric android application repackaging detection". | 0 | 0.34 | 2018 |
DroidSieve: Fast and Accurate Classification of Obfuscated Android Malware. | 24 | 0.80 | 2017 |
Flipping 419 Cybercrime Scams: Targeting the Weak and the Vulnerable. | 0 | 0.34 | 2017 |
Understanding Android app piggybacking. | 6 | 0.42 | 2017 |
Transcend: Detecting Concept Drift In Malware Classification Models | 9 | 0.44 | 2017 |
Understanding Android App Piggybacking: A Systematic Study of Malicious Code Grafting | 38 | 1.00 | 2017 |
Stack Object Protection with Low Fat Pointers. | 0 | 0.34 | 2017 |
POTUS: Probing Off-The-Shelf USB Drivers with Symbolic Fault Injection. | 0 | 0.34 | 2017 |
Modular Synthesis of Heap Exploits. | 0 | 0.34 | 2017 |
Euphony: harmonious unification of cacophonous anti-virus vendor labels for Android malware. | 7 | 0.51 | 2017 |
The Evolution of Android Malware and Android Analysis Techniques. | 45 | 1.56 | 2017 |
You can't touch this: Consumer-centric android application repackaging detection. | 4 | 0.42 | 2016 |
Prescience: Probabilistic Guidance on the Retraining Conundrum for Malware Detection. | 6 | 0.42 | 2016 |
DroidScribe: Classifying Android Malware Based on Runtime Behavior | 29 | 0.85 | 2016 |
CopperDroid: Automatic Reconstruction of Android Malware Behaviors. | 0 | 0.34 | 2015 |
Conformal Clustering and Its Application to Botnet Traffic. | 1 | 0.43 | 2015 |
PuppetDroid: A User-Centric UI Exerciser for Automatic Dynamic Analysis of Similar Android Applications. | 11 | 0.51 | 2014 |
Phoenix: Dga-Based Botnet Tracking And Intelligence | 47 | 1.58 | 2014 |
Tracking and Characterizing Botnets Using Automatically Generated Domains. | 8 | 0.62 | 2013 |
Practical automated vulnerability monitoring using program state invariants | 5 | 0.39 | 2013 |
Peering Into The Muddy Waters Of Pastebin | 2 | 0.39 | 2012 |
When hardware meets software: a bulletproof solution to forensic memory acquisition | 15 | 0.58 | 2012 |
Memory errors: the past, the present, and the future | 47 | 1.76 | 2012 |
Taint-enhanced anomaly detection | 2 | 0.36 | 2011 |
Systems Security at VU University Amsterdam | 1 | 0.35 | 2011 |
Sandnet: network traffic analysis of malicious software | 42 | 2.27 | 2011 |
PAriCheck: an efficient pointer arithmetic checker for C programs | 43 | 1.40 | 2010 |
MINIX 3: Status report and current research | 0 | 0.34 | 2010 |
Take a deep breath: a stealthy, resilient and cost-effective botnet using skype | 13 | 0.63 | 2010 |
We crashed, now what? | 4 | 0.46 | 2010 |
Organizing large scale hacking competitions | 17 | 1.90 | 2010 |
Live and trustworthy forensic analysis of commodity production systems | 26 | 1.05 | 2010 |
Your botnet is my botnet: analysis of a botnet takeover | 253 | 14.70 | 2009 |
Anomalous Taint Detection | 5 | 0.43 | 2008 |
LISABETH: automated content-based signature generator for zero-day polymorphic worms | 20 | 1.01 | 2008 |
On the Limits of Information Flow Techniques for Malware Analysis and Containment | 64 | 3.24 | 2008 |
A Parallel Architecture for Stateful, High-Speed Intrusion Detection | 10 | 0.70 | 2008 |
An Efficient Technique For Preventing Mimicry And Impossible Paths Execution Attacks | 8 | 0.53 | 2007 |