Metadata Search Funding Data Link References Status API Help
Facet browsing currently unavailable
Page 1 of 124843 results
Sort by: relevance publication year

Limits of Static Analysis for Malware Detection

PROCEEDINGS ARTICLE published December 2007 in Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007)

Authors: Andreas Moser | Christopher Kruegel | Engin Kirda

Limits of Static Analysis for Malware Detection

PROCEEDINGS ARTICLE published December 2007 in Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007)

Authors: Andreas Moser | Christopher Kruegel | Engin Kirda

Exploring Multiple Execution Paths for Malware Analysis

PROCEEDINGS ARTICLE published May 2007 in 2007 IEEE Symposium on Security and Privacy (SP '07)

Authors: Andreas Moser | Christopher Kruegel | Engin Kirda

Secure Input for Web Applications

PROCEEDINGS ARTICLE published December 2007 in Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007)

Authors: Martin Szydlowski | Christopher Kruegel | Engin Kirda

Secure Input for Web Applications

PROCEEDINGS ARTICLE published December 2007 in Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007)

Authors: Martin Szydlowski | Christopher Kruegel | Engin Kirda

Improving Signature Testing through Dynamic Data Flow Analysis

PROCEEDINGS ARTICLE published December 2007 in Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007)

Authors: Christopher Kruegel | Davide Balzarotti | William Robertson | Giovanni Vigna

Improving Signature Testing through Dynamic Data Flow Analysis

PROCEEDINGS ARTICLE published December 2007 in Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007)

Authors: Christopher Kruegel | Davide Balzarotti | William Robertson | Giovanni Vigna

A layout-similarity-based approach for detecting phishing pages

PROCEEDINGS ARTICLE published 2007 in 2007 Third International Conference on Security and Privacy in Communications Networks and the Workshops - SecureComm 2007

Authors: Angelo P. E. Rosiello | Engin Kirda | Christopher Kruegel | Fabrizio Ferrandi

HoneyIM: Fast Detection and Suppression of Instant Messaging Malware in Enterprise-Like Networks

PROCEEDINGS ARTICLE published December 2007 in Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007)

Authors: Mengjun Xie | Zhenyu Wu | Haining Wang

MetaAware: Identifying Metamorphic Malware

PROCEEDINGS ARTICLE published December 2007 in Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007)

Authors: Qinghua Zhang | Douglas S. Reeves

HoneyIM: Fast Detection and Suppression of Instant Messaging Malware in Enterprise-Like Networks

PROCEEDINGS ARTICLE published December 2007 in Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007)

Authors: Mengjun Xie | Zhenyu Wu | Haining Wang

MetaAware: Identifying Metamorphic Malware

PROCEEDINGS ARTICLE published December 2007 in Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007)

Authors: Qinghua Zhang | Douglas S. Reeves

OmniUnpack: Fast, Generic, and Safe Unpacking of Malware

PROCEEDINGS ARTICLE published December 2007 in Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007)

Authors: Lorenzo Martignoni | Mihai Christodorescu | Somesh Jha

OmniUnpack: Fast, Generic, and Safe Unpacking of Malware

PROCEEDINGS ARTICLE published December 2007 in Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007)

Authors: Lorenzo Martignoni | Mihai Christodorescu | Somesh Jha

Combining Static and Dynamic Analysis for Automatic Identification of Precise Access-Control Policies

PROCEEDINGS ARTICLE published December 2007 in Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007)

Authors: Paolina Centonze | Robert J. Flynn | Marco Pistoia

Combining Static and Dynamic Analysis for Automatic Identification of Precise Access-Control Policies

PROCEEDINGS ARTICLE published December 2007 in Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007)

Authors: Paolina Centonze | Robert J. Flynn | Marco Pistoia

Twenty-Third Annual Computer Security Applications Conference - TOC

PROCEEDINGS ARTICLE published December 2007 in Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007)

Twenty-Third Annual Computer Security Applications Conference - Title

PROCEEDINGS ARTICLE published December 2007 in Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007)

Twenty-Third Annual Computer Security Applications Conference - Copyright

PROCEEDINGS ARTICLE published December 2007 in Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007)

Twenty-Third Annual Computer Security Applications Conference - Cover

PROCEEDINGS ARTICLE published December 2007 in Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007)