27.06.2013 Views

6th European Conference - Academic Conferences

6th European Conference - Academic Conferences

6th European Conference - Academic Conferences

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Jaime Acosta<br />

Cormen, T.H., Leiserson, C.E., Rivest, R.L., Stein, C. (2001) Introduction to Algorithms, The MIT press.<br />

Cornelissen, B. (2009) “Evaluating Dynamic Analysis Techniques for Program Comprehension”, Delft University<br />

of Technology.<br />

Göbel, J. G. (2009) “Amun: Python honeypot”, http://amunhoney.sourceforge.net.<br />

Han, S., Lee, K. and Lee, S. (2010) “Packed PE File Detection for Malware Forensics”, Second International<br />

<strong>Conference</strong> on Computer Science and its Applications (CSA), pp 1–7.<br />

Jang, J. and Brumley, D. (2009) “BitShred: Fast, Scalable Code Reuse Detection in Binary Code”, CMU-CyLab,<br />

pp 28–37.<br />

Kasina, A., Suthar, A. and Kumar, R. (2010) “Detection of Polymorphic Viruses in Windows Executables”,<br />

Contemporary Computing, pp 120–130.<br />

Kirillov, I., Beck, D., Chase, P., and Martin, R. (2010) “Malware Attribute Enumeration and Characterization”,<br />

http://maec.mitre.org/.<br />

Lee, J., Jeong, K., and Lee, H. (2010) “Detecting metamorphic malwares using code graphs”, ACM Symposium<br />

on Applied Computing, pp 1970–1977.<br />

Norman Solutions (2003), “Norman sandbox whitepaper”<br />

http://download.norman.no/whitepapers/whitepaper_Norman_SandBox.pdf<br />

Provos, N. (2004) “A virtual honeypot framework”, USENIX Security Symposium, Vol. 13, pg 1.<br />

Rieck, K., Trinius, P., Willems, C. and Holz, T. “Automatic Analysis of Malware Behavior using Machine<br />

Learning”, Journal of Computer Security (JCS), to appear 2010.<br />

Roy, C.K. and Cordy, J.R. (2007) “A survey on software clone detection research”, Queen’s School of Computing<br />

TR, Vol. 541, pg 115.<br />

Sharif, M., Lanzi, A., Giffin, J. and Lee, W. (2009) “Automatic reverse engineering of malware emulators”, IEEE<br />

Symposium on Security and Privacy, pp 94–109.<br />

Trinius, P., Willems, C., Holz, T. and Rieck, K. (2010) “A Malware Instruction Set for Behavior-based Analysis”,<br />

Sicherheit 2010, pp 205–216.<br />

Vinod, P., Jaipur, R., Laxmi, V. and Gaur, M.S. (2009) “Survey on malware detection methods”, Hack, pg 74.<br />

Willems, C., Holz, T., Freiling, F. (2007) “Toward automated dynamic malware analysis using CWSandbox”, IEEE<br />

Security and Privacy, Vol. 5, No. 2, pp 32–39.<br />

Ye, Y., Wang, D., Li, T., Ye, D. and Jiang, Q. (2007) “An intelligent PE-malware detection system based on<br />

association mining”, Journal in computer virology, Vol. 4, No. 4, pp 323–334.<br />

7

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!