Planning and integrating deception into computer security defenses, Proceedings of the 2014 workshop on New Security Paradigms Workshop, pp.127-138, 2014. ,
From Patches to Honey-Patches, Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, CCS '14, pp.942-953, 2014. ,
DOI : 10.1007/978-3-642-22424-9_3
Experiences with honey-patching in active cyber security education, 8th Workshop on Cyber Security Experimentation and Test (CSET 15), 2015. ,
Low-threat security patches and tools, International Conference on Software Maintenance, pp.306-313, 1997. ,
Baiting inside attackers using decoy documents, 2009. ,
Automatic Patch-Based Exploit Generation is Possible: Techniques and Implications, 2008 IEEE Symposium on Security and Privacy (sp 2008), pp.143-157, 2008. ,
DOI : 10.1109/SP.2008.17
URL : http://www.cs.cmu.edu/~dbrumley/pubs/apeg.pdf
Unassisted and automatic generation of high-coverage tests for complex systems programs, OSDI, pp.209-224, 2008. ,
Surreptitious software. Upper Saddle River, 2010. ,
Watermarking, tamper-proofing, and obfuscation-tools for software protection, IEEE Transactions on software engineering, vol.28, issue.8, pp.735-746, 2002. ,
Protecting Your Software Updates, IEEE Security & Privacy, vol.11, issue.2, pp.47-54, 2013. ,
DOI : 10.1109/MSP.2012.113
URL : http://users.elis.ugent.be/~brdsutte/research/publications/2013IEEESPcoppens.pdf
Booby trapping software, Proceedings of the 2013 workshop on New security paradigms workshop, NSPW '13, pp.95-106, 2013. ,
DOI : 10.1145/2535813.2535824
URL : http://www.nspw.org/papers/2013/nspw2013-crane.pdf
Computer Recreations, A Core War Bestiary of Virus, Worms and other Threats to Computer Memories, Scientific America, vol.252, 1985. ,
mov is turing-complete, pp.153-2013 ,
Code Artificiality: A Metric for the Code Stealth Based on an N-Gram Model, 2015 IEEE/ACM 1st International Workshop on Software Protection, pp.31-37, 2015. ,
DOI : 10.1109/SPRO.2015.14
The LLVM Compiler Infrastructure, 2017. ,
DOI : 10.1007/11532378_2
The art of deception: Controlling the human element of security, 2011. ,
Limits of Static Analysis for Malware Detection, Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007), pp.421-430, 2007. ,
DOI : 10.1109/ACSAC.2007.21
Fight against 1-day exploits: Diffing binaries vs anti-diffing binaries . Black Hat, 2009. ,
Decoy document deployment for effective masquerade attack detection, Detection of Intrusions and Malware, and Vulnerability Assessment, pp.35-54, 2011. ,
More than passive defense, CERIAS, 2011. ,
Internet security threat report ,
Deobfuscation: Reverse engineering obfuscated code, Reverse Engineering, 12th Working Conference on, p.10, 2005. ,
The practical defending of malicious reverse engineering, 2015. ,
Toward a general theory of deception, Journal of Strategic Studies, vol.19, issue.1, pp.178-192, 1982. ,
DOI : 10.1037/0003-066X.33.10.869
SandPrint: Fingerprinting Malware Sandboxes to Provide Intelligence for Sandbox Evasion, International Symposium on Research in Attacks, Intrusions, and Defenses, pp.165-187, 2016. ,
DOI : 10.1145/2590296.2590325
Defensive computer-security deception operations: processes, principles and techniques, 2006. ,
Honeyfiles: deceptive files for intrusion detection, Proceedings from the Fifth Annual IEEE SMC Information Assurance Workshop, 2004., pp.116-122, 2004. ,
DOI : 10.1109/IAW.2004.1437806