|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 26 occurrences of 22 keywords
|
|
|
Results
Found 53 publication records. Showing 53 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
236 | Joshua Mason, Sam Small, Fabian Monrose, Greg MacManus |
English shellcode. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2009 ACM Conference on Computer and Communications Security, CCS 2009, Chicago, Illinois, USA, November 9-13, 2009, pp. 524-533, 2009, ACM, 978-1-60558-894-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
shellcode, natural language, network emulation |
155 | Lanjia Wang, Hai-Xin Duan, Xing Li 0001 |
Dynamic emulation based modeling and detection of polymorphic shellcode at the network level. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Sci. China Ser. F Inf. Sci. ![In: Sci. China Ser. F Inf. Sci. 51(11), pp. 1883-1897, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
polymorphic shellcode, CPU emulation, intrusion detection |
134 | Hsiang-Lun Huang, Tzong-Jye Liu, Kuong-Ho Chen, Chyi-Ren Dow, Lih-Chyau Wuu |
A polymorphic shellcode detection mechanism in the network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Infoscale ![In: Proceedings of the 2nf International Conference on Scalable Information Systems, Infoscale 2007, Suzhou, China, June 6-8, 2007, pp. 64, 2007, ACM, 978-1-59593-757-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
polymorphic shellcode, intrusion detection system, buffer overflow |
108 | Michalis Polychronakis, Kostas G. Anagnostakis, Evangelos P. Markatos |
Network-level polymorphic shellcode detection using emulation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. Virol. ![In: J. Comput. Virol. 2(4), pp. 257-274, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
107 | Manuel Egele, Peter Wurzinger, Christopher Kruegel, Engin Kirda |
Defending Browsers against Drive-by Downloads: Mitigating Heap-Spraying Code Injection Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DIMVA ![In: Detection of Intrusions and Malware, and Vulnerability Assessment, 6th International Conference, DIMVA 2009, Como, Italy, July 9-10, 2009. Proceedings, pp. 88-106, 2009, Springer, 978-3-642-02917-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
malicious script, shellcode, emulation, Drive-by download |
102 | Makoto Shimamura, Kenji Kono |
Yataglass: Network-Level Code Emulation for Analyzing Memory-Scanning Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DIMVA ![In: Detection of Intrusions and Malware, and Vulnerability Assessment, 6th International Conference, DIMVA 2009, Como, Italy, July 9-10, 2009. Proceedings, pp. 68-87, 2009, Springer, 978-3-642-02917-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Network-level code emulation, Memory-scanning attack, Intrusion detection, Code-injection attack, Intrusion analysis |
93 | Yingbo Song, Michael E. Locasto, Angelos Stavrou, Angelos D. Keromytis, Salvatore J. Stolfo |
On the infeasibility of modeling polymorphic shellcode. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2007 ACM Conference on Computer and Communications Security, CCS 2007, Alexandria, Virginia, USA, October 28-31, 2007, pp. 541-551, 2007, ACM, 978-1-59593-703-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
shellcode, polymorphism, statistical models, signature generation |
93 | Udo Payer, Peter Teufl, Mario Lamberger |
Hybrid Engine for Polymorphic Shellcode Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DIMVA ![In: Detection of Intrusions and Malware, and Vulnerability Assessment, Second International Conference, DIMVA 2005, Vienna, Austria, July 7-8, 2005, Proceedings, pp. 19-31, 2005, Springer, 3-540-26613-5. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
polymorphic shellcode detection, neural networks, Intrusion Detection |
87 | Yves Younan, Pieter Philippaerts, Frank Piessens, Wouter Joosen, Sven Lachmund, Thomas Walter 0001 |
Filter-resistant code injection on ARM. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2009 ACM Conference on Computer and Communications Security, CCS 2009, Chicago, Illinois, USA, November 9-13, 2009, pp. 11-20, 2009, ACM, 978-1-60558-894-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
alphanumeric shellcode, filter-resistance, turing completeness |
68 | Michalis Polychronakis, Kostas G. Anagnostakis, Evangelos P. Markatos |
Network-Level Polymorphic Shellcode Detection Using Emulation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DIMVA ![In: Detection of Intrusions and Malware & Vulnerability Assessment, Third International Conference, DIMVA 2006, Berlin, Germany, July 13-14, 2006, Proceedings, pp. 54-73, 2006, Springer, 3-540-36014-X. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
66 | Udo Payer, Stefan Kraxberger |
Polymorphic Code Detection with GA Optimized Markov Models. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Communications and Multimedia Security ![In: Communications and Multimedia Security, 9th IFIP TC-6 TC-11 International Conference, CMS 2005, Salzburg, Austria, September 19-21, 2005, Proceedings, pp. 210-219, 2005, Springer, 3-540-28791-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
polymorphic shellcode detection, genetic algorithms, optimization, intrusion detection, markov models |
47 | Michalis Polychronakis, Kostas G. Anagnostakis, Evangelos P. Markatos |
Emulation-Based Detection of Non-self-contained Polymorphic Shellcode. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RAID ![In: Recent Advances in Intrusion Detection, 10th International Symposium, RAID 2007, Gold Goast, Australia, September 5-7, 2007, Proceedings, pp. 87-106, 2007, Springer, 978-3-540-74319-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
41 | Michalis Foukarakis, Demetres Antoniades, Michalis Polychronakis |
Deep packet anonymization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROSEC ![In: Proceedings of the Second European Workshop on System Security, EUROSEC 2009, Nuremburg, Germany, March 31, 2009, pp. 16-21, 2009, ACM, 978-1-60558-472-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
41 | Georgios Portokalidis, Asia Slowinska, Herbert Bos |
Argos: an emulator for fingerprinting zero-day attacks for advertised honeypots with automatic signature generation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroSys ![In: Proceedings of the 2006 EuroSys Conference, Leuven, Belgium, April 18-21, 2006, pp. 15-27, 2006, ACM, 1-59593-322-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
27 | Yuanding Zhou |
Least Information Redundancy Algorithm of Printable Shellcode Encoding for X86. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS Workshops (2) ![In: Computer Security. ESORICS 2023 International Workshops - CPS4CIP, ADIoT, SecAssure, WASP, TAURIN, PriST-AI, and SECAI, The Hague, The Netherlands, September 25-29, 2023, Revised Selected Papers, Part II, pp. 361-376, 2023, Springer, 978-3-031-54128-5. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
27 | Pengju Liu, Baojiang Cui, Can Cui |
Traffic-Oriented Shellcode Detection Based on VSM. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EIDWT ![In: Advances in Internet, Data & Web Technologies - The 11th International Conference on Emerging Internet, Data & Web Technologies, EIDWT 2023, Semarang, Indonesia, 23-25 February 2023., pp. 152-162, 2023, Springer, 978-3-031-26280-7. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
27 | Guang Yang 0019, Xiang Chen 0005, Yanlin Zhou, Chi Yu |
DualSC: Automatic Generation and Summarization of Shellcode via Transformer and Dual Learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2202.09785, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP BibTeX RDF |
|
27 | Guang Yang 0019, Xiang Chen 0005, Yanlin Zhou, Chi Yu |
DualSC: Automatic Generation and Summarization of Shellcode via Transformer and Dual Learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SANER ![In: IEEE International Conference on Software Analysis, Evolution and Reengineering, SANER 2022, Honolulu, HI, USA, March 15-18, 2022, pp. 361-372, 2022, IEEE, 978-1-6654-3786-8. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
27 | Pietro Liguori, Erfan Al-Hossami, Domenico Cotroneo, Roberto Natella, Bojan Cukic, Samira Shaikh |
Shellcode_IA32: A Dataset for Automatic Shellcode Generation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2104.13100, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP BibTeX RDF |
|
27 | Ayan Dey, Shibashis Ghosh, Sukriti Bhattacharya, Nabendu Chaki |
A robust software watermarking framework using shellcode. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Multim. Tools Appl. ![In: Multim. Tools Appl. 79(3-4), pp. 2555-2576, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
27 | Yue Pan, Jing An, Wenqing Fan, Wei Huang |
Shellfier: A Shellcode Detection Method based on Dynamic Binary Instrumentation and Convolutional Neural Network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSCA ![In: Proceedings of the 8th International Conference on Software and Computer Applications, ICSCA '19, Penang, Malaysia, February 19-21, 2019, pp. 462-466, 2019, ACM, 978-1-4503-6573-4. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
27 | Shu Akabane, Tomoya Miwa, Takeshi Okamoto |
An EAF guard driver to prevent shellcode from removing guard pages. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KES ![In: Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 23rd International Conference KES-2019, Budapest, Hungary, 4-6 September 2019., pp. 2432-2439, 2019, Elsevier. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
27 | Tianliang Lu, Lu Zhang 0032, Yixian Fu |
A Novel Immune-Inspired Shellcode Detection Algorithm Based on Hyperellipsoid Detectors. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Secur. Commun. Networks ![In: Secur. Commun. Networks 2018, pp. 2063089:1-2063089:10, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
27 | Jaewoo Park, Hyoungshick Kim |
k-Depth Mimicry Attack to Secretly Embed Shellcode into PDF Files. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISA ![In: Information Science and Applications 2017 - ICISA 2017, Macau, China, 20-23 March 2017, pp. 388-395, 2017, Springer, 978-981-10-4153-2. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
27 | Tiffany Bao, Ruoyu Wang 0001, Yan Shoshitaishvili, David Brumley |
Your Exploit is Mine: Automatic Shellcode Transplant for Remote Exploits. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Symposium on Security and Privacy ![In: 2017 IEEE Symposium on Security and Privacy, SP 2017, San Jose, CA, USA, May 22-26, 2017, pp. 824-839, 2017, IEEE Computer Society, 978-1-5090-5533-3. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
27 | Chong Kuan Chen, Shen-Chieh Lan, Shiuhpyng Winston Shieh |
Shellcode detector for malicious document hunting. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DSC ![In: IEEE Conference on Dependable and Secure Computing, DSC 2017, Taipei, Taiwan, August 7-10, 2017, pp. 527-528, 2017, IEEE, 978-1-5090-5569-2. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
27 | Damjan Buhov, Richard Thron, Sebastian Schrittwieser |
Catch Me if You Can! Transparent Detection of Shellcode. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSSA ![In: International Conference on Software Security and Assurance, ICSSA 2016, St. Pölten, Austria, August 24-25, 2016, pp. 60-63, 2016, IEEE, 978-1-5090-4388-0. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
27 | Ji-Hyeon Yoon, Jeong Oh Kye, Yongdae Kim, Hae Young Lee |
Decoder-Free Sino-Korean Shellcode. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSSA ![In: International Conference on Software Security and Assurance, ICSSA 2016, St. Pölten, Austria, August 24-25, 2016, pp. 75-78, 2016, IEEE, 978-1-5090-4388-0. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
27 | Takeshi Okamoto |
SecondDEP: Resilient Computing that Prevents Shellcode Execution in Cyber-Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KES ![In: 19th International Conference in Knowledge Based and Intelligent Information and Engineering Systems, KES 2015, Singapore, 7-9 September 2015, pp. 691-699, 2015, Elsevier. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
27 | Patrick Onotu, David Day, Marcos A. Rodrigues 0001 |
Accurate shellcode recognition from network traffic data using artificial neural nets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCECE ![In: IEEE 28th Canadian Conference on Electrical and Computer Engineering, CCECE 2015, Halifax, NS, Canada, May 3-6, 2015, pp. 355-360, 2015, IEEE, 978-1-4799-5827-6. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
27 | Sven Schindler, Oliver Eggert, Bettina Schnor, Thomas Scheffler |
Shellcode Detection in IPv6 Networks with HoneydV6. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SECRYPT ![In: SECRYPT 2014 - Proceedings of the 11th International Conference on Security and Cryptography, Vienna, Austria, 28-30 August, 2014, pp. 198-205, 2014, SciTePress, 978-989-758-045-1. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
27 | Yonggan Hou, Jianwei Zhuge, Dan Xin, Wenya Feng |
SBE - A Precise Shellcode Detection Engine Based on Emulation and Support Vector Machine. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPEC ![In: Information Security Practice and Experience - 10th International Conference, ISPEC 2014, Fuzhou, China, May 5-8, 2014. Proceedings, pp. 159-171, 2014, Springer, 978-3-319-06319-5. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
27 | Erik Bosman, Herbert Bos |
Framing Signals - A Return to Portable Shellcode. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Symposium on Security and Privacy ![In: 2014 IEEE Symposium on Security and Privacy, SP 2014, Berkeley, CA, USA, May 18-21, 2014, pp. 243-258, 2014, IEEE Computer Society, 978-1-4799-4686-0. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
27 | Donghai Tian, Mo Chen, Changzhen Hu, Xuanya Li |
Efficient Shellcode Detection on Commodity Hardware. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEICE Trans. Inf. Syst. ![In: IEICE Trans. Inf. Syst. 96-D(10), pp. 2272-2276, 2013. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
27 | Ang Cui, Jatin Kataria, Salvatore J. Stolfo |
Revisiting the myth of Cisco IOS diversity: recent advances in reliable shellcode design. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. Manag. Comput. Secur. ![In: Inf. Manag. Comput. Secur. 21(2), pp. 121-138, 2013. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
27 | Ziming Zhao 0001, Gail-Joon Ahn |
Using instruction sequence abstraction for shellcode detection and attribution. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CNS ![In: IEEE Conference on Communications and Network Security, CNS 2013, National Harbor, MD, USA, October 14-16, 2013, pp. 323-331, 2013, IEEE. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
27 | Pratik Kumar, Nagendra Chowdary, Anish Mathuria |
Alphanumeric Shellcode Generator for ARM Architecture. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SPACE ![In: Security, Privacy, and Applied Cryptography Engineering - Third International Conference, SPACE 2013, Kharagpur, India, October 19-23, 2013. Proceedings, pp. 38-39, 2013, Springer, 978-3-642-41223-3. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
27 | Boxuan Gu, Wenbin Zhang 0005, Xiaole Bai, Adam C. Champion, Feng Qin, Dong Xuan |
JSGuard: Shellcode Detection in JavaScript. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SecureComm ![In: Security and Privacy in Communication Networks - 8th International ICST Conference, SecureComm 2012, Padua, Italy, September 3-5, 2012. Revised Selected Papers, pp. 112-130, 2012, Springer, 978-3-642-36882-0. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
27 | Thomas C. Schmidt, Matthias Wählisch, Benjamin Jochheim, Michael Gröning |
WiSec 2011 poster: context-adaptive entropy analysis as a lightweight detector of zero-day shellcode on mobiles. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM SIGMOBILE Mob. Comput. Commun. Rev. ![In: ACM SIGMOBILE Mob. Comput. Commun. Rev. 15(3), pp. 47-48, 2011. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Ping Chen 0003, Xiao Xing, Bing Mao, Li Xie 0001, Xiaobin Shen 0001, Xinchun Yin |
Automatic construction of jump-oriented programming shellcode (on the x86). ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, ASIACCS 2011, Hong Kong, China, March 22-24, 2011, pp. 20-29, 2011, ACM, 978-1-4503-0564-8. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Ang Cui, Jatin Kataria, Salvatore J. Stolfo |
Killing the Myth of Cisco IOS Diversity: Recent Advances in Reliable Shellcode Design. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WOOT ![In: 5th USENIX Workshop on Offensive Technologies, WOOT'11, August 8, 2011, San Francisco, CA, USA, Proceedings, pp. 19-27, 2011, USENIX Association. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP BibTeX RDF |
|
27 | Yanick Fratantonio, Christopher Kruegel, Giovanni Vigna |
Shellzer: A Tool for the Dynamic Analysis of Malicious Shellcode. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RAID ![In: Recent Advances in Intrusion Detection - 14th International Symposium, RAID 2011, Menlo Park, CA, USA, September 20-21, 2011. Proceedings, pp. 61-80, 2011, Springer, 978-3-642-23643-3. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Yingbo Song, Michael E. Locasto, Angelos Stavrou, Angelos D. Keromytis, Salvatore J. Stolfo |
On the infeasibility of modeling polymorphic shellcode - Re-thinking the role of learning in intrusion detection systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Mach. Learn. ![In: Mach. Learn. 81(2), pp. 179-205, 2010. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
27 | Boxuan Gu, Xiaole Bai, Zhimin Yang, Adam C. Champion, Dong Xuan |
Malicious Shellcode Detection with Virtual Memory Snapshots. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INFOCOM ![In: INFOCOM 2010. 29th IEEE International Conference on Computer Communications, Joint Conference of the IEEE Computer and Communications Societies, 15-19 March 2010, San Diego, CA, USA, pp. 974-982, 2010, IEEE, 978-1-4244-5838-7. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
27 | Michalis Polychronakis, Kostas G. Anagnostakis, Evangelos P. Markatos |
Comprehensive shellcode detection using runtime heuristics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Twenty-Sixth Annual Computer Security Applications Conference, ACSAC 2010, Austin, Texas, USA, 6-10 December 2010, pp. 287-296, 2010, ACM, 978-1-4503-0133-6. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
27 | Mehdi Talbi, Mohamed Mejri, Adel Bouhoula |
Specification and evaluation of polymorphic shellcode properties using a new temporal logic. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. Virol. ![In: J. Comput. Virol. 5(3), pp. 171-186, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
27 | Salvatore J. Stolfo |
Polymorphic shellcode: the demise of signature-based detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSIIRW ![In: Fifth Cyber Security and Information Intelligence Research Workshop, CSIIRW '09, Knoxville, TN, USA, April 13-15, 2009, pp. 7, 2009, ACM, 978-1-60558-518-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
27 | Daewon Kim, Ikkyun Kim, Jintae Oh, Jongsoo Jang |
Tracing Stored Program Counter to Detect Polymorphic Shellcode. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEICE Trans. Inf. Syst. ![In: IEICE Trans. Inf. Syst. 91-D(8), pp. 2192-2195, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
27 | Iván Arce |
The Shellcode Generation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Secur. Priv. ![In: IEEE Secur. Priv. 2(5), pp. 72-76, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
taxonomy of attacks, exploitation program, attack, exploits |
26 | Daewon Kim, Yangseo Choi, Ikkyun Kim, Jintae Oh, Jongsoo Jang |
Function Call Mechanism Based Executable Code Detection for the Network Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAINT ![In: Proceedings of the 2008 International Symposium on Applications and the Internet, SAINT 2008, 28 July - 1 August 2008, Turku, Finland, pp. 62-67, 2008, IEEE Computer Society, 978-0-7695-3297-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
shellcode, security, network, exploit |
20 | Stéphane Duverger |
Linux 2.6 kernel exploits. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. Virol. ![In: J. Comput. Virol. 4(1), pp. 39-60, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
20 | Hung-Min Sun, Yue-Hsun Lin, Ming-Fung Wu |
API Monitoring System for Defeating Worms and Exploits in MS-Windows System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy, 11th Australasian Conference, ACISP 2006, Melbourne, Australia, July 3-5, 2006, Proceedings, pp. 159-170, 2006, Springer, 3-540-35458-1. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Worm Protection, API Hooking, System Security |
20 | Udo Payer, Peter Teufl, Stefan Kraxberger, Mario Lamberger |
Massive Data Mining for Polymorphic Code Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MMM-ACNS ![In: Computer Network Security, Third International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2005, St. Petersburg, Russia, September 25-27, 2005, Proceedings, pp. 448-453, 2005, Springer, 3-540-29113-X. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #53 of 53 (100 per page; Change: )
|
|