Author of the publication

FIRMA: Malware Clustering and Network Signature Generation with Mixed Network Behaviors.

, and . RAID, volume 8145 of Lecture Notes in Computer Science, page 144-163. Springer, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Deep Dive into the VirusTotal File Feed., , , and . DIMVA, volume 13959 of Lecture Notes in Computer Science, page 155-176. Springer, (2023)AVclass: A Tool for Massive Malware Labeling., , , and . RAID, volume 9854 of Lecture Notes in Computer Science, page 230-253. Springer, (2016)Towards Generating High Coverage Vulnerability-Based Signatures with Protocol-Level Constraint-Guided Exploration., , , and . RAID, volume 5758 of Lecture Notes in Computer Science, page 161-181. Springer, (2009)Certified PUP: Abuse in Authenticode Code Signing., , , and . CCS, page 465-478. ACM, (2015)BCD: Decomposing Binary Code Into Components Using Graph-Based Clustering., , , , , and . AsiaCCS, page 393-398. ACM, (2018)Decoding the Secrets of Machine Learning in Malware Classification: A Deep Dive into Datasets, Feature Extraction, and Model Performance., , , , , , , and . CCS, page 60-74. ACM, (2023)RevProbe: detecting silent reverse proxies in malicious server infrastructures., , , , and . ACSAC, page 101-112. ACM, (2016)FIRMA: Malware Clustering and Network Signature Generation with Mixed Network Behaviors., and . RAID, volume 8145 of Lecture Notes in Computer Science, page 144-163. Springer, (2013)SigPath: A Memory Graph Based Approach for Program Data Introspection and Modification., , , and . ESORICS (2), volume 8713 of Lecture Notes in Computer Science, page 237-256. Springer, (2014)One Size Does not Fit All: Quantifying the Risk of Malicious App Encounters for Different Android User Profiles., , , , and . USENIX Security Symposium, page 5683-5700. USENIX Association, (2023)