The Rootkit Arsenal: Escape and Evasion in the Dark Corners of the System, 2009. ,
Automatic behaviour-based analysis and classification system for malware detection, ICEIS 2010 -Proceedings of the 12th International Conference on Enterprise Information Systems, pp.395-399, 2010. ,
Improving the Detection of Malware Behaviour Using Simplified Data Dependent API Call Graph, International Journal of Security and Its Applications, vol.7, issue.5, pp.29-42, 2013. ,
DOI : 10.14257/ijsia.2013.7.5.03
malwash: Washing malware to evade dynamic analysis, Proceedings of the 10th USENIX Conference on Offensive Technologies. pp. 106?117. WOOT'16, USENIX Association, 2016. ,
Combating the evasion mechanisms of social bots, Computers & Security, vol.58, pp.230-249, 2016. ,
DOI : 10.1016/j.cose.2016.01.007
A Mulitiprocess Mechanism of Evading Behavior-Based Bot Detection Approaches, Proceedings of the 10th International Conference on Information Security Practice and Experience, pp.75-89, 2014. ,
DOI : 10.1007/978-3-319-06320-1_7
Effective and efficient malware detection at the end host, Proceedings of the 18th Conference on USENIX Security Symposium SSYM'09, USENIX Association, pp.351-366, 2009. ,
Shadow attacks: automatically evading system-call-behavior based malware detection, Journal in Computer Virology, vol.4, issue.1, pp.1-13, 2012. ,
DOI : 10.1007/s11416-008-0084-2
URL : http://faculty.cse.tamu.edu/guofei/paper/ShadowAttacks_final-onecolumn.pdf
Employing program semantics for malware detection, MSDN: File system minifilter drivers, pp.2591-2604, 2015. ,
Multi-stage delivery of malware, 2010 5th International Conference on Malicious and Unwanted Software, pp.91-97, 2010. ,
DOI : 10.1109/MALWARE.2010.5665788
URL : http://nob.cs.ucdavis.edu/%7Ebishop/papers/2010-malware/msmalware.pdf
Multiprocess malware, 2011 6th International Conference on Malicious and Unwanted Software, 2011. ,
DOI : 10.1109/MALWARE.2011.6112320