6th European Conference - Academic Conferences
6th European Conference - Academic Conferences
6th European Conference - Academic Conferences
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
Jaime Acosta<br />
Cormen, T.H., Leiserson, C.E., Rivest, R.L., Stein, C. (2001) Introduction to Algorithms, The MIT press.<br />
Cornelissen, B. (2009) “Evaluating Dynamic Analysis Techniques for Program Comprehension”, Delft University<br />
of Technology.<br />
Göbel, J. G. (2009) “Amun: Python honeypot”, http://amunhoney.sourceforge.net.<br />
Han, S., Lee, K. and Lee, S. (2010) “Packed PE File Detection for Malware Forensics”, Second International<br />
<strong>Conference</strong> on Computer Science and its Applications (CSA), pp 1–7.<br />
Jang, J. and Brumley, D. (2009) “BitShred: Fast, Scalable Code Reuse Detection in Binary Code”, CMU-CyLab,<br />
pp 28–37.<br />
Kasina, A., Suthar, A. and Kumar, R. (2010) “Detection of Polymorphic Viruses in Windows Executables”,<br />
Contemporary Computing, pp 120–130.<br />
Kirillov, I., Beck, D., Chase, P., and Martin, R. (2010) “Malware Attribute Enumeration and Characterization”,<br />
http://maec.mitre.org/.<br />
Lee, J., Jeong, K., and Lee, H. (2010) “Detecting metamorphic malwares using code graphs”, ACM Symposium<br />
on Applied Computing, pp 1970–1977.<br />
Norman Solutions (2003), “Norman sandbox whitepaper”<br />
http://download.norman.no/whitepapers/whitepaper_Norman_SandBox.pdf<br />
Provos, N. (2004) “A virtual honeypot framework”, USENIX Security Symposium, Vol. 13, pg 1.<br />
Rieck, K., Trinius, P., Willems, C. and Holz, T. “Automatic Analysis of Malware Behavior using Machine<br />
Learning”, Journal of Computer Security (JCS), to appear 2010.<br />
Roy, C.K. and Cordy, J.R. (2007) “A survey on software clone detection research”, Queen’s School of Computing<br />
TR, Vol. 541, pg 115.<br />
Sharif, M., Lanzi, A., Giffin, J. and Lee, W. (2009) “Automatic reverse engineering of malware emulators”, IEEE<br />
Symposium on Security and Privacy, pp 94–109.<br />
Trinius, P., Willems, C., Holz, T. and Rieck, K. (2010) “A Malware Instruction Set for Behavior-based Analysis”,<br />
Sicherheit 2010, pp 205–216.<br />
Vinod, P., Jaipur, R., Laxmi, V. and Gaur, M.S. (2009) “Survey on malware detection methods”, Hack, pg 74.<br />
Willems, C., Holz, T., Freiling, F. (2007) “Toward automated dynamic malware analysis using CWSandbox”, IEEE<br />
Security and Privacy, Vol. 5, No. 2, pp 32–39.<br />
Ye, Y., Wang, D., Li, T., Ye, D. and Jiang, Q. (2007) “An intelligent PE-malware detection system based on<br />
association mining”, Journal in computer virology, Vol. 4, No. 4, pp 323–334.<br />
7