Citations
The paper
has been cited by the following works.
- Killer computer bugs.
IEEE Spectrum, Progress column, March 2003.
p. 63.
- Craig
Schmugar and Vincent Gullotto.
Method
and apparatus for a virus information patrol.
United States Patent 6,654,751, November 2003.
Assignee: Networks Associates Technology, Inc. (Santa Clara, CA).
- Emory A. Anderson,
Cynthia E. Irvine, and Roger R. Schell.
Subversion
as a threat in information warfare.
Journal of Information Warfare, 2004.
- Ruo Ando, Hideaki Miura,
and Yoshiyasu Takefuji.
File system driver filtering against metamorphic viral coding.
WSEAS Transactions on Information Science and Applications,
4(1):1026–1034, October 2004.
- Naomi Falby, J.D.
Fulp, Paul C. Clark, R. Scott Cote, Cynthia E. Irvine, George W. Dinolt,
Timothy E. Levin, Matthew Rose, and Deborah Shifflett.
Information
assurance capacity building: A case study.
In Proceedings of the Colloquium on Information Systems Security
Education, pages 31–36, 2004.
- Cynthia E. Irvine,
Timothy E. Levin, Thuy D. Nguyen, and George W. Dinolt.
The
trusted computing exemplar project.
In Proceedings of the 2004 IEEE Systems Man and Cybernetics Information
Assurance Workshop, pages 109–115, June 2004.
- K. G.
Anagnostakis, S. Sidiroglou, P. Akritidis, K. Xinidis, E. Markatos, and A. D.
Keromytis.
Detecting
targeted attacks using shadow honeypots.
In 14th USENIX Security Symposium, Berkeley, CA, August 2005.
Usenix Association.
- M. Christodorescu, S. Jha, S.A. Seshia, D. Song, and R.E.
Bryant.
Semantics-aware malware detection.
In Proceedings — IEEE Symposium on Security and Privacy, pages
32–46, 2005.
- S. Sidiroglou,
J. Ioannidis, A. D. Keromytis, and Stolfo S.J.
An email worm vaccine architecture.
In Information Security Practice and Experience, pages 97–108.
Springer Verlag, 2005.
LNCS 3439.
- Matt Webster.
Algebraic
specification of computer viruses and their environments.
In Peter Mosses, John Power, and Monika Seisenberger, editors, Selected
Papers from the First Conference on Algebra and Coalgebra in Computer Science
Young Researchers Workshop (CALCO-jnr 2005). University of Wales Swansea
Computer Science Report Series CSR 18-2005, pages 99–113, 2005.
- Zuo Z.H., Zhu Q.X., and
Zhou M.T.
On the time complexity of computer viruses.
IEEE Transactions on Information Theory, 51(8):2962–2966, August
2005.
(doi:10.1109/TIT.2005.851780)
- Ruo Ando, Nguyen Anh
Quynh, and Yoshiyasu Takefuji.
Faster
resolution based metamorphic virus detection using ATP control
strategy.
WSEAS Transactions on Information Science and Applications,
3(2):260–226, February 2006.
- Mohamed R.
Chouchane and Arun Lakhotia.
Using engine signature to detect metamorphic malware.
In WORM '06: Proceedings of the 4th ACM workshop on Recurring
malcode, pages 73–78, New York, NY, USA, 2006. ACM Press.
(doi:10.1145/1179542.1179558)
- Eric Filiol, Marko
Helenius, and Stefano Zanero.
Open problems in computer virology.
Journal in Computer Virology, 1(3):55–66, 2006.
(doi:10.1007/s11416-005-0008-3)
- Rachit Mathur.
Normalizing
metamorphic malware using term rewriting.
Master's thesis, Louisiana at Lafayette, 2006.
- Andrew
Walenstein, Rachit Mathur, Mohamed R. Chouchane, and Arun Lakhotia.
Normalizing metamorphic malware using term rewriting.
In SCAM '06: Proceedings of the Sixth IEEE International Workshop on
Source Code Analysis and Manipulation, pages 75–84, Washington, DC,
USA, 2006. IEEE Computer Society.
(doi:10.1109/SCAM.2006.20)
- W. Wong and M. Stamp.
Hunting for metamorphic engines.
Journal in Computer Virology, 2(3):211–229, 2006.
(doi:10.1007/s11416-006-0028-7)
- K.G.
Anagnostakis, M.B. Greenwald, S. Ioannidis, and A.D. Keromytis.
COVERAGE: Detecting and reacting to worm epidemics using cooperation and
validation.
International Journal of Information Security, 6(6):361–378,
2007.
(doi:10.1007/s10207-007-0032-z)
- R. Ando.
Parallel analysis of polymorphic viral code using automated deduction system.
In Proceedings — SNPD 2007: Eighth ACIS International Conference on
Software Engineering, Artificial Intelligence, Networking, and
Parallel/Distributed Computing, volume 2, pages 585–592, 2007.
(doi:10.1109/SNPD.2007.415)
- Éric Filiol.
Sciences à risque: Virus.
Les Dossiers de la Recherche, 26:82–85, February 2007.
- E. Filiol.
Formalisation and implementation aspects of k-ary (malicious) codes.
Journal in Computer Virology, 3(2):75–86, 2007.
(doi:10.1007/s11416-007-0044-2)
- S.J. Barr, S.J. Cardman,
and D.M. Martin Jr.
A boosting ensemble for the recognition of code sharing in malware.
Journal in Computer Virology, 4(4):335–345, 2008.
(doi:10.1007/s11416-008-0087-z)
- J.-M. Borello and
L. Mé.
Code obfuscation techniques for metamorphic viruses.
Journal in Computer Virology, 4(3):211–220, 2008.
(doi:10.1007/s11416-008-0084-2)
- K.R.B. Butler,
S. McLaughlin, and P.D. McDaniel.
Rootkit-resistant disks.
In Proceedings of the ACM Conference on Computer and Communications
Security, pages 403–415, 2008.
(doi:10.1145/1455770.1455821)
- G. Jacob, H. Debar, and
E. Filiol.
Behavioral detection of malware: From a survey towards an established taxonomy.
Journal in Computer Virology, 4(3):251–266, 2008.
(doi:10.1007/s11416-008-0086-0)
- R. Ando.
Automated log analysis of infected windows os using mechanized reasoning.
Lecture Notes in Computer Science (including subseries Lecture Notes in
Artificial Intelligence and Lecture Notes in Bioinformatics), 5864
LNCS(PART 2):540–547, 2009.
(doi:10.1007/978-3-642-10684-2_60)
- B. Dolan-Gavitt,
A. Srivastava, P. Traynor, and J. Giffin.
Robust signatures for kernel data structures.
In Proceedings of the ACM Conference on Computer and Communications
Security, pages 566–577, 2009.
(doi:10.1145/1653662.1653730)
- G. Jacob, E. Filiol, and
H. Debar.
Functional polymorphic engines: Formalisation, implementation and use cases.
Journal in Computer Virology, 5(3):247–261, 2009.
(doi:10.1007/s11416-008-0095-z)
- S. Josse.
White-box attack context cryptovirology.
Journal in Computer Virology, 5(4):321–334, 2009.
(doi:10.1007/s11416-008-0097-x)
- Y.-X. Lai and Z.-H. Liu.
Unknown malicious identification.
Lecture Notes in Electrical Engineering, 39 LNEE:301–312, 2009.
(doi:10.1007/978-90-481-2311-7_26)
- R. Owens and W. Wang.
Building a dark piconet upon bluetooth interfaces of computers.
In Proceedings - IEEE Military Communications Conference MILCOM,
2009.
(doi:10.1109/MILCOM.2009.5379892)
- R.I. Podlovchenko,
N.N. Kuzyurin, V.S. Shcherbina, and V.A. Zakharov.
Using algebraic models of programs for detecting metamorphic malwares.
Fundamental and Applied Mathematics, 15(5):181–198, 2009.
- J.-M. Borello,
E. Filiol, and L. Mé.
From the design of a generic metamorphic engine to a black-box classification
of antivirus detection techniques.
Journal in Computer Virology, 6(3):277–287, 2010.
(doi:10.1007/s11416-009-0136-2)
- D. Gamayunov, N.T.M.
Quan, F. Sakharov, and E. Toroshchin.
Race walk: Fast instruction frequency analysis and classification for shellcode
detection in network flow.
In EC2ND 2009 - European Conference on Computer Network Defense,
pages 4–12, 2010.
(doi:10.1109/EC2ND.2009.9)
- T. Huffmire,
C. Irvine, T.D. Nguyen, T. Levin, R. Kastner, and T. Sherwood.
Handbook of FPGA design security.
Springer Netherlands, 2010.
(doi:10.1007/978-90-481-9157-4)
- Y. Song, M.E. Locasto,
A. Stavrou, A.D. Keromytis, and S.J. Stolfo.
On the infeasibility of modeling polymorphic shellcode : Re-thinking the role
of learning in intrusion detection systems.
Machine Learning, 81(2):179–205, 2010.
(doi:10.1007/s10994-009-5143-5)
- J. Carter.
An architecture for Concordia.
In ACM International Conference Proceeding Series, 2011.
(doi:10.1145/2179298.2179353)
- Y.-X. Lai and Z. Yang.
Unknown malicious detection based on improved bayes algorithm.
Beijing Gongye Daxue Xuebao/Journal of Beijing University of
Technology, 37(5):766–772, 2011.
- S.-T. Liu, H.-C. Huang, and
Y.-M. Chen.
A system call analysis method with MapReduce for malware detection.
In Proceedings of the International Conference on Parallel and
Distributed Systems - ICPADS, pages 631–637, 2011.
(doi:10.1109/ICPADS.2011.17)
- P.K.K. Loh and F. Tan.
Mechanisms of polymorphic and metamorphic viruses.
In Proceedings - 2011 European Intelligence and Security Informatics
Conference, EISIC 2011, pages 149–154, 2011.
(doi:10.1109/EISIC.2011.77)
- R.I. Podlovchenko,
N.N. Kuzyurin, V.S. Shcherbina, and V.A. Zakharov.
Using algebraic models of programs for detecting metamorphic malwares.
Journal of Mathematical Sciences, 172(5):740–750, 2011.
(doi:10.1007/s10958-011-0216-y)
- Stylianos
Sidiroglou, Angelos D. Keromytis, and Kostas G. Anagnostakis.
Systems
and methods for detecting and inhibiting attacks using honeypots.
United States Patent 7,904,959, March 2011.
Assignee: The Trustees of Columbia University in the City of New York (New
York, NY).
- L. Zhu.
An identification method on unknown malicious code based on the good or evil
index of API.
In 2011 International Conference on Multimedia Technology, ICMT
2011, pages 5285–5288, 2011.
(doi:10.1109/ICMT.2011.6002319)
- L. Zhu and S. Liu.
An experimental comparative study on three classification algorithms on unknown
malicious code identification.
In 2011 International Conference on Multimedia Technology, ICMT
2011, pages 4829–4832, 2011.
(doi:10.1109/ICMT.2011.6002063)
- Y. Lai and Z. Liu.
Unknown malicious code detection comparison of statistical and encoding method.
Information, 15(11 A):4563–4571, 2012.
- Y. Zheng, F. Liu, X. Luo,
and C. Yang.
A method based on feature matching to identify steganography software.
In Proceedings - 2012 4th International Conference on Multimedia and
Security, MINES 2012, pages 989–994, 2012.
(doi:10.1109/MINES.2012.26)
- D. Bueno, K.J.
Compton, K.A. Sakallah, and M. Bailey.
Detecting traditional packers, decisively.
16th International Symposium on Research in Attacks, Intrusions, and
Defenses, RAID 2013, 8145 LNCS:184–203, 2013.
(doi:10.1007/978-3-642-41284-4_10)
- A. Narayanan,
Y. Chen, S. Pang, and B. Tao.
The effects of different representations on static structure analysis of
computer malware signatures.
The Scientific World Journal, 2013, 2013.
(doi:10.1155/2013/671096)
- Stylianos
Sidiroglou, Angelos D. Keromytis, and Salvatore J. Stolfo.
Systems,
methods, and media protecting a digital data processing device from
attack.
United States Patent 8,407,785, March 2013.
Assignee: The Trustees of Columbia University in the City of New York (New
York, NY).
- Q. Yan, Y. Li, and R.H.
Deng.
Malware protection on RFID-enabled supply chain management systems in the
EPCglobal network.
In Advanced Security and Privacy for RFID Technologies, pages
153–175. IGI Global, 2013.
(doi:10.4018/978-1-4666-3685-9.ch010)
- Q. Yan, Y. Li, and R.H.
Deng.
Malware protection on RFID-enabled supply chain management systems in the
EPCglobal network.
Crisis Management: Concepts, Methodologies, Tools, and
Applications, 2-3:1166–1188, 2013.
(doi:10.4018/978-1-4666-4707-7.ch058)
- S. Alam, R.N. Horspool,
and I. Traore.
MARD: A framework for metamorphic malware analysis and real-time detection.
In 28th IEEE International Conference on Advanced Information Networking
and Applications, IEEE AINA 2014, pages 480–489. Institute of
Electrical and Electronics Engineers Inc., 2014.
(doi:10.1109/AINA.2014.59)
- M. Azab and
M. Eltoweissy.
Bio-inspired evolutionary sensory system for cyber-physical system security.
Intelligent Systems Reference Library, 70:39–69, 2014.
(doi:10.1007/978-3-662-43616-5_2)
- M. Azab and
M. Eltoweissy.
CyPhyMASC: Evolutionary monitoring, analysis, sharing and control platform
for SmartGrid defense.
In 15th IEEE International Conference on Information Reuse and
Integration, IEEE IRI 2014, pages 639–645. Institute of Electrical
and Electronics Engineers Inc., 2014.
(doi:10.1109/IRI.2014.7051950)
- J. Bai, J. Wang, and
G. Zou.
A malware detection scheme based on mining format information.
Scientific World Journal, 2014, 2014.
(doi:10.1155/2014/260905)
- S. Deshpande,
Y. Park, and M. Stamp.
Eigenvalue analysis for metamorphic detection.
Journal in Computer Virology, 10(1):53–65, 2014.
(doi:10.1007/s11416-013-0193-4)
- L. Han, M. Qian, X. Xu,
C. Fu, and H. Kwisaba.
Malicious code detection model based on behavior association.
Tsinghua Science and Technology, 19(5):508–515, 2014.
(doi:10.1109/TST.2014.6919827)
- S. Naval, V. Laxmi,
M. Rajarajan, M.S. Gaur, and M. Conti.
Employing program semantics for malware detection.
IEEE Transactions on Information Forensics and Security,
10(12):2591–2604, 2015.
(doi:10.1109/TIFS.2015.2469253)
- Stylianos
Sidiroglou, Angelos D. Keromytis, and Salvatore J. Stolfo.
Systems,
methods, and media protecting a digital data processing device from
attack.
United States Patent 9,143,518, September 2015.
Assignee: The Trustees of Columbia University in the City of New York (New
York, NY).
- X. Wang, N.L. Or,
Z. Lu, and D. Pao.
Hardware accelerator to detect multi-segment virus patterns.
Computer Journal, 58(10):2443–2460, 2015.
(doi:10.1093/comjnl/bxu079)
- B. Pechaz, M.V. Jahan,
and M. Jalali.
Malware detection using hidden markov model based on markov blanket feature
selection method.
In 2nd International Congress on Technology, Communication and Knowledge,
ICTCK 2015, pages 558–563. Institute of Electrical and Electronics
Engineers Inc., 2016.
(doi:10.1109/ICTCK.2015.7582729)
- Michalis Polychronakis and Angelos Keromytis.
Detecting
return-oriented programming payloads by evaluating data for a gadget address
space address and determining whether operations associated with instructions
beginning at the address indicate a return-oriented programming payload.
United States Patent 9,495,541, November 2016.
Assignee: The Trustees of Columbia University in the City of New York (New
York, NY).
- Stylianos
Sidiroglou, Angelos D. Keromytis, and Salvatore J. Stolfo.
Systems,
methods, and media protecting a digital data processing device from
attack.
United States Patent 9,544,322, January 2017.
Assignee: The Trustees of Columbia University in the City of New York (New
York, NY).
Home
Unless otherwise expressly stated, all original material on this page created by Diomidis Spinellis is licensed under a Creative Commons Attribution-Share Alike 3.0 Greece License.