Scaling Software Security Analysis to Millions of Malicious Programs and Billions of Lines of Code

作者: Jiyong Jang

DOI: 10.1184/R1/6721400.V1

关键词:

摘要: … that allowmore users to be connected to each other, including malicious users. According to Syman¬tec, 5.5 billion malicious attacks were detected in 2011, which was an increase of …

参考文章(105)
Tudor Dumitras, Iulian Neamtiu, Experimental challenges in cyber security: a story of provenance and lineage for malware usenix security symposium. pp. 9- 9 ,(2011)
Georg Wicherski, peHash: a novel approach to fast malware clustering usenix conference on large scale exploits and emergent threats. pp. 1- 1 ,(2009)
Inderjit S. Dhillon, Yuqiang Guan, Hyuk Cho, Suvrit Sra, Minimum sum-squared residue co-clustering of gene expression data siam international conference on data mining. pp. 114- 125 ,(2004)
Cory Kapser, Michael W. Godfrey, Toward a Taxonomy of Clones in Source Code: A Case Study ,(2003)
Jiyong Jang, Maverick Woo, David Brumley, Towards automatic software lineage inference usenix security symposium. pp. 81- 96 ,(2013)
Ulrich Bayer, Christopher Kruegel, Engin Kirda, TTAnalyze: A Tool for Analyzing Malware Proceedings of the European Institute for Computer Antivirus Research Annual Conference,2006. ,(2006)
Fanglu Guo, Peter Ferrie, Tzi-cker Chiueh, A Study of the Packer Problem and Its Solutions recent advances in intrusion detection. pp. 98- 115 ,(2008) , 10.1007/978-3-540-87403-4_6
Andrew Walenstein, Arun Lakhotia, The Software Similarity Problem in Malware Analysis dagstuhl seminar proceedings. pp. 0- ,(2007)
Fredrik Valeur, Christopher Kruegel, Giovanni Vigna, William Robertson, Static disassembly of obfuscated binaries usenix security symposium. pp. 18- 18 ,(2004)
Steve Hanna, Ling Huang, Edward Wu, Saung Li, Charles Chen, Dawn Song, Juxtapp: a scalable system for detecting code reuse among android applications international conference on detection of intrusions and malware and vulnerability assessment. pp. 62- 81 ,(2012) , 10.1007/978-3-642-37300-8_4