Detection of global, metamorphic malware variants using control and data flow analysis, 31st IEEE Military Communications Conference, MILCOM 2012, pp.1-6, 2012. ,
Zero-day malware detection based on supervised learning algorithms of api call signatures, Proceedings of the Ninth Australasian Data Mining Conference, vol.121, pp.171-182 ,
, , 2011.
A quantitative study of accuracy in system call-based malware detection, Proceedings of the 2012 International Symposium on Software Testing and Analysis, pp.122-132, 2012. ,
URL : https://hal.archives-ouvertes.fr/hal-00727280
Semantics-aware malware detection, 2005 IEEE Symposium on Security and Privacy (S P'05), pp.32-46, 2005. ,
, , 2018.
, ClamAV: Clamav 0.99b meets yara! ClamAV blog
Distributed application tamper detection via continuous software updates, Proceedings of the 28th Annual Computer Security Applications Conference, pp.319-328, 2012. ,
Detecting unknown malware: Security analytics & memory forensics, 2015. ,
Dart: Directed automated random testing, Proceedings of the 2005 ACM SIGPLAN Conference on Programming Language Design and Implementation, pp.213-223, 2005. ,
Survey of virtual machine research, Computer, vol.7, issue.6, pp.34-45, 1974. ,
Intel: Intel 64 and ia-32 architectures software developer's manual combined volumes 2a, 2b, 2c, and 2d: Instruction set reference, a-z, pp.325383-067, 2007. ,
Bypassing sanboxes for fun ! Presentation at hack, 2014. ,
Semantic malware detection by deploying graph mining, International Journal of Computer Science Issues (IJCSI), vol.9, issue.1, p.373, 2012. ,
Barecloud: Bare-metal analysis-based evasive malware detection, USENIX Security Symposium, pp.287-301, 2014. ,
On the concept of software obfuscation in computer security, Information Security, 10th International Conference, vol.4779, pp.281-298, 2007. ,
, , 2007.
The art of memory forensics: detecting malware and threats in windows, linux, and Mac memory, 2014. ,
, MissMalware: Tdsanomalpe identifying compile time manipulation in pe headers. Miss Malware blog
Limits of static analysis for malware detection, Twenty-Third Annual Computer Security Applications Conference, pp.421-430, 2007. ,
Limits of static analysis for malware detection, pp.421-430, 2007. ,
Peering inside the pe: A tour of the win32 portable executable file format, Microsoft Developer Network blog, 1994. ,
A semanticsbased approach to malware detection, SIGPLAN Not, vol.42, issue.1, pp.377-388, 2007. ,
Yara documentation ,
Oracle virtualbox multiple guest to host escape vulnerabilities, SecuriTeam Secure Disclosure blog, 2018. ,
Cute: A concolic unit testing engine for c, Proceedings of the 10th European Software Engineering Conference Held Jointly with 13th ACM SIGSOFT International Symposium on Foundations of Software Engineering, pp.263-272, 2005. ,
Evolution and detection of polymorphic and metamorphic malwares: A survey, International Journal of Computer Applications, vol.90, issue.2, pp.7-11, 2014. ,
SoK: (State of) The Art of War: Offensive Techniques in Binary Analysis, IEEE Symposium on Security and Privacy, 2016. ,
Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software, 2012. ,
, throwing a tantrum, part 1: angr internals. Angr blog
The Art of Computer Virus Research and Defense, 2005. ,
To crypt, or to mine that is the question. post on Securelist-Kaspersky Lab's cyberthreat research and reports, 2018. ,
, Following the White Rabbit: Software attacks against Intel (R) VT-d technology, 2011.
Symbolic execution of obfuscated code, Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, pp.732-744, 2015. ,