Panorama: Capturing system-wide information flow for malware detection and analysis (2007)

by Heng Yin , Dawn Song , Manuel Egele , Christopher Kruegel , Engin Kirda
Venue:In Proceedings of the 14th ACM Conferences on Computer and Communication Security (CCS’07
Citations:115 - 25 self

Active Bibliography

65 Dynamic Spyware Analysis – Manuel Egele, Christopher Kruegel, Engin Kirda, Heng Yin - 2007
worm’s payload. Capturing and Analyzing Internet Worms By – Jedidiah Richard Crandall, Jedidiah Richard Crandall
183 TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones – William Enck, Landon P. Cox, Jaeyeon Jung, et al. - 2010
7 Minemu: The World’s Fastest Taint Tracker – Erik Bosman, Asia Slowinska, Herbert Bos - 2011
12 Neon: System Support for Derived Data Management – Qing Zhang, John Mccullough, Justin Ma, Nabil Schear, Michael Vrable, Amin Vahdat, Alex C. Snoeren, Geoffrey M. Voelker, Stefan Savage
1 On Information Flow for Intrusion Detection: What if Accurate Full-system Dynamic Information Flow Tracking Was Possible? ABSTRACT – Mohammed I. Al-saleh
28 On the Limits of Information Flow Techniques for Malware Analysis and Containment – Lorenzo Cavallaro, Prateek Saxena, R. Sekar
13 libdft: Practical Dynamic Data Flow Tracking for Commodity Systems – Vasileios P. Kemerlis, Georgios Portokalidis, Kangkook Jee, Angelos D. Keromytis
5 A General Approach for Efficiently Accelerating Software-based Dynamic Data Flow Tracking on Commodity Hardware – Kangkook Jee, Georgios Portokalidis, Vasileios P. Kemerlis, Soumyadeep Ghosh, David I. August, Angelos D. Keromytis - 2012
3 A Survey on Automated Dynamic Malware Analysis Techniques and Tools – Manuel Egele, Christopher Kruegel
245 Vigilante: End-to-End Containment of Internet Worm Epidemics – Manuel Costa, Jon Crowcroft, Miguel Castro, Antony Rowstron, Lidong Zhou, Lintao Zhang, Paul Barham - 2008
Flow Tracking in a Distributed Environment by – Andrey Ermolinskiy, Scott Shenker, Andrey Ermolinskiy, Andrey Ermolinskiy
74 Securing Software by Enforcing Data-flow Integrity – Miguel Castro - 2006
28 Pointless Tainting? Evaluating the Practicality of Pointer Tainting – Asia Slowinska, Herbert Bos - 2009
Carnegie Mellon University. – Zhuowei Li, Xiaofeng Wang, Zhenkai Liang, Michael K. Reiter
1 Protecting Kernel Code and Data with a Virtualization-Aware Collaborative Operating System – Daniela Alvim, Seabra Oliveira, S. Felix Wu
8 Eudaemon: Involuntary and On-Demand Emulation Against Zero-Day Exploits – Georgios Portokalidis, Herbert Bos - 2008
64 Practical taint-based protection using demand emulation – Alex Ho, Michael Fetterman, Christopher Clark, Andrew Warfield, Steven Hand - 2006
23 Measuring Channel Capacity to Distinguish Undue Influence – James Newsome, Stephen Mccamant, Dawn Song