Hunting for metamorphic (2001)


Download Links

by Péter Ször , Peter Ferrie
Venue:In Virus Bulletin Conference
Citations:82 - 0 self

Active Bibliography

INSIDE ∆ Evolution of Code ∆ Metamorphic Virus Detection Examples ∆ Possible Future Virus Developments – Péter Ször, Peter Ferrie, Symantec Hunting, For Metamorphic
Evolution of Code Metamorphic Virus Detection Examples Possible Future Virus DevelopmentsSymantec HUNTING FOR METAMORPHIC Contents – White Paper, For Metamorphic, Péter Ször, Peter Ferrie
Abstract Earlybird: Catching the Internet Worm – Marco Barreno - 2003
Computer Viruses as Artificial Life – Eugene Spafford Department, Eugene H. Spafford - 1994
Journal of Computer Science 1 (1): 31-34, 2005 – Issn Science Publications, José Roberto Castilho Piqueira, Betyna Fernández Navarro, Luiz Henrique Alves Monteiro
1 A model for detecting the existence of unknown computer viruses in real-time – Je Rey M. Voas, Dr. Frederick, B. Cohen, Je Ery E. Payne - 1992
2 Attack Modelling – Sokratis Katsikas, Thomas Spyroua, Dimitris Gritzalisa, John Darzentasa - 1996
CERIAS Tech Report 2007-64 Happy Birthday, Dear Viruses – Richard Ford, Eugene H. Spafford, Richard Ford, Eugene H. Spafford
Biological Aspects of Computer Virology – Vasileios Vlachos, Diomidis Spinellis, Stefanos Androutsellis-theotokis
A Scalable Hybrid Network Monitoring Architecture for Measuring, Characterizing, and Tracking Internet Threat Dynamics – Michael Donald Bailey, Michael Donald Bailey, Farnam Jahanian - 2006
Results-Oriented Security – Matt Bishop, Richard Ford, Marco Ramilli
Cent, Five Cent, Ten Cent, Dollar: Hitting Botnets Where it Really Hurts ABSTRACT – Richard Ford, Bots In Each Case
2 “Good ” Worms and Human Rights – John Aycock, Alana Maurushat - 2006
7 Handheld Viruses: A Significant Threat? – Simon N. Foley, Robert Dumigan - 2000
8 A Comparative Evaluation of Two Algorithms for Windows Registry Anomaly Detection – Salvatore J. Stolfo, Frank Apap, Eleazar Eskin, Katherine Heller, Andrew Honig, Krysta Svore - 2005
3 Using Process Models to Analyze Health Care Security Requirements – Susanne Rohrig, Secune Swissit Ag - 2002
2 A Physiological Decomposition Of Virus And Worm Programs – Prabhat Kumar Singh, William R. Edwards, Jr. C. E. Palmer - 2002
31 Detecting malicious software by monitoring anomalous windows registry accesses – Frank Apap, Andrew Honig, Shlomo Hershkop, Eleazar Eskin, Sal Stolfo - 2002
10 An overview of computer viruses in a research environment – Matt Bishop - 1992