Search dblp for Publications

export results for "polymorphic worm"

 download as .bib file

@article{DBLP:journals/ijis/WangYWLBT22,
  author       = {Fangwei Wang and
                  Shaojie Yang and
                  Changguang Wang and
                  Qingru Li and
                  Kehinde O. Babaagba and
                  Zhiyuan Tan},
  title        = {Toward machine intelligence that learns to fingerprint polymorphic
                  worms in IoT},
  journal      = {Int. J. Intell. Syst.},
  volume       = {37},
  number       = {10},
  pages        = {7058--7078},
  year         = {2022},
  url          = {https://doi.org/10.1002/int.22871},
  doi          = {10.1002/INT.22871},
  timestamp    = {Mon, 24 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijis/WangYWLBT22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/virology/EskandariSG19,
  author       = {Razieh Eskandari and
                  Mahdi Shajari and
                  Mojtaba Mostafavi Ghahfarokhi},
  title        = {{ERES:} an extended regular expression signature for polymorphic worm
                  detection},
  journal      = {J. Comput. Virol. Hacking Tech.},
  volume       = {15},
  number       = {3},
  pages        = {177--194},
  year         = {2019},
  url          = {https://doi.org/10.1007/s11416-019-00330-1},
  doi          = {10.1007/S11416-019-00330-1},
  timestamp    = {Fri, 13 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/virology/EskandariSG19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nana/WangYZW19,
  author       = {Fangwei Wang and
                  Shaojie Yang and
                  Dongmei Zhao and
                  Changguang Wang},
  title        = {An Automatic Signature-Based Approach for Polymorphic Worms in Big
                  Data Environment},
  booktitle    = {2019 International Conference on Networking and Network Applications,
                  NaNA 2019, Daegu, Korea (South), October 10-13, 2019},
  pages        = {223--228},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/NaNA.2019.00047},
  doi          = {10.1109/NANA.2019.00047},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nana/WangYZW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/AljawarnehMM16,
  author       = {Shadi A. Aljawarneh and
                  Raja A. Moftah and
                  Abdelsalam M. Maatuk},
  title        = {Investigations of automatic methods for detecting the polymorphic
                  worms signatures},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {60},
  pages        = {67--77},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.future.2016.01.020},
  doi          = {10.1016/J.FUTURE.2016.01.020},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/fgcs/AljawarnehMM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/AlmarshadMP16,
  author       = {Malak Abdullah I. Almarshad and
                  Mohssen M. Z. E. Mohammed and
                  Al{-}Sakib Khan Pathan},
  title        = {Detecting Zero-day Polymorphic Worms with Jaccard Similarity Algorithm},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {8},
  number       = {3},
  year         = {2016},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/2128},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/AlmarshadMP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spaccs/WangW16,
  author       = {Jie Wang and
                  Jie Wu},
  editor       = {Guojun Wang and
                  Indrakshi Ray and
                  Jose M. Alcaraz Calero and
                  Sabu M. Thampi},
  title        = {A Novel Signature Generation Approach in Noisy Environments for Detecting
                  Polymorphic Worm},
  booktitle    = {Security, Privacy, and Anonymity in Computation, Communication, and
                  Storage - 9th International Conference, SpaCCS 2016, Zhangjiajie,
                  China, November 16-18, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10066},
  pages        = {109--121},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-49148-6\_10},
  doi          = {10.1007/978-3-319-49148-6\_10},
  timestamp    = {Mon, 05 Feb 2024 20:29:50 +0100},
  biburl       = {https://dblp.org/rec/conf/spaccs/WangW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ica3pp/WangH15,
  author       = {Jie Wang and
                  Xiaoxian He},
  editor       = {Guojun Wang and
                  Albert Y. Zomaya and
                  Gregorio Mart{\'{\i}}nez P{\'{e}}rez and
                  Kenli Li},
  title        = {A Novel Signature Generation Approach for Polymorphic Worms},
  booktitle    = {Algorithms and Architectures for Parallel Processing - 15th International
                  Conference, {ICA3PP} 2015, Zhangjiajie, China, November 18-20, 2015.
                  Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9530},
  pages        = {369--382},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-27137-8\_28},
  doi          = {10.1007/978-3-319-27137-8\_28},
  timestamp    = {Sat, 06 Aug 2022 22:05:44 +0200},
  biburl       = {https://dblp.org/rec/conf/ica3pp/WangH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/intrust/WangH15,
  author       = {Jie Wang and
                  Xiaoxian He},
  editor       = {Moti Yung and
                  Jian{-}biao Zhang and
                  Zhen Yang},
  title        = {A Signature Generation Approach Based on Clustering for Polymorphic
                  Worm},
  booktitle    = {Trusted Systems - 7th International Conference, {INTRUST} 2015, Beijing,
                  China, December 7-8, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9565},
  pages        = {84--96},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-31550-8\_6},
  doi          = {10.1007/978-3-319-31550-8\_6},
  timestamp    = {Mon, 10 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/intrust/WangH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/VirvilisG14,
  author       = {Nikos Virvilis and
                  Dimitris Gritzalis},
  title        = {Automatic Defense Against Zero-day Polymorphic Worms in Communication
                  Networks},
  journal      = {Comput. Secur.},
  volume       = {42},
  pages        = {191--192},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.cose.2014.01.007},
  doi          = {10.1016/J.COSE.2014.01.007},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/VirvilisG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comsur/KaurS14,
  author       = {Ratinder Kaur and
                  Maninder Singh},
  title        = {A Survey on Zero-Day Polymorphic Worm Detection Techniques},
  journal      = {{IEEE} Commun. Surv. Tutorials},
  volume       = {16},
  number       = {3},
  pages        = {1520--1549},
  year         = {2014},
  url          = {https://doi.org/10.1109/SURV.2014.022714.00160},
  doi          = {10.1109/SURV.2014.022714.00160},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/comsur/KaurS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/Shahin14a,
  author       = {Ashraf A. Shahin},
  title        = {Polymorphic Worms Collection in Cloud Computing},
  journal      = {CoRR},
  volume       = {abs/1409.1654},
  year         = {2014},
  url          = {http://arxiv.org/abs/1409.1654},
  eprinttype    = {arXiv},
  eprint       = {1409.1654},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/Shahin14a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/BayogluS12,
  author       = {Burak Bayoglu and
                  Ibrahim Sogukpinar},
  title        = {Graph based signature classes for detecting polymorphic worms via
                  content analysis},
  journal      = {Comput. Networks},
  volume       = {56},
  number       = {2},
  pages        = {832--844},
  year         = {2012},
  url          = {https://doi.org/10.1016/j.comnet.2011.11.007},
  doi          = {10.1016/J.COMNET.2011.11.007},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cn/BayogluS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccseit/JabroothP12,
  author       = {A. Uzma Jabrooth and
                  B. Parvathavarthini},
  editor       = {Natarajan Meghanathan and
                  Michal Wozniak},
  title        = {Polymorphic worms detection using Extended PolyTree},
  booktitle    = {The Second International Conference on Computational Science, Engineering
                  and Information Technology, {CCSEIT} '12, Coimbatore, India, October
                  26-28, 2012},
  pages        = {532--538},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2393216.2393305},
  doi          = {10.1145/2393216.2393305},
  timestamp    = {Thu, 07 Nov 2019 15:14:46 +0100},
  biburl       = {https://dblp.org/rec/conf/ccseit/JabroothP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/KongJGZLX11,
  author       = {Deguang Kong and
                  Yoon{-}chan Jhi and
                  Tao Gong and
                  Sencun Zhu and
                  Peng Liu and
                  Hongsheng Xi},
  title        = {{SAS:} semantics aware signature generation for polymorphic worm detection},
  journal      = {Int. J. Inf. Sec.},
  volume       = {10},
  number       = {5},
  pages        = {269--283},
  year         = {2011},
  url          = {https://doi.org/10.1007/s10207-011-0132-7},
  doi          = {10.1007/S10207-011-0132-7},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/KongJGZLX11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tc/TangXL11,
  author       = {Yong Tang and
                  Bin Xiao and
                  Xicheng Lu},
  title        = {Signature Tree Generation for Polymorphic Worms},
  journal      = {{IEEE} Trans. Computers},
  volume       = {60},
  number       = {4},
  pages        = {565--579},
  year         = {2011},
  url          = {https://doi.org/10.1109/TC.2010.130},
  doi          = {10.1109/TC.2010.130},
  timestamp    = {Sun, 23 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tc/TangXL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/tr/Bayoglu10,
  author       = {Burak Bayoglu},
  title        = {Polimorfik solucan sald{\i}r{\i}lar{\i}n{\i}n tespiti (Detection of
                  polymorphic worm attacks)},
  school       = {Gebze Institute of Technology, Turkey},
  year         = {2010},
  url          = {https://tez.yok.gov.tr/UlusalTezMerkezi/tezDetay.jsp?id=3vLI6\_FF6t1VxHbmsrWF\_A\&no=EC4WQQtp-WKmkq6XfA4VFw},
  timestamp    = {Sat, 04 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/phd/tr/Bayoglu10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ton/WangLCFL10,
  author       = {Lanjia Wang and
                  Zhichun Li and
                  Yan Chen and
                  Zhi Fu and
                  Xing Li},
  title        = {Thwarting zero-day polymorphic worms with network-level length-based
                  signature generation},
  journal      = {{IEEE/ACM} Trans. Netw.},
  volume       = {18},
  number       = {1},
  pages        = {53--66},
  year         = {2010},
  url          = {http://doi.acm.org/10.1145/1816288.1816293},
  doi          = {10.1145/1816288.1816293},
  timestamp    = {Fri, 20 Oct 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ton/WangLCFL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csreaSAM/MohammedCVHA10,
  author       = {Mohssen M. Z. E. Mohammed and
                  H. Anthony Chan and
                  Neco Ventura and
                  Mohsin Hashim and
                  Izzeldin Amin},
  editor       = {Hamid R. Arabnia and
                  Kevin Daimi and
                  Michael R. Grimaila and
                  George Markowsky and
                  Selim Aissi and
                  Victor A. Clincy and
                  Leonidas Deligiannidis and
                  Donara Gabrielyan and
                  Gevorg Margarov and
                  Ashu M. G. Solo and
                  Craig Valli and
                  Patricia A. H. Williams},
  title        = {Zero-day Polymorphic Worms Detection Using {A} modified Boyer-Moore
                  Algorithm},
  booktitle    = {Proceedings of the 2010 International Conference on Security {\&}
                  Management, {SAM} 2010, July 12-15, 2010, Las Vegas Nevada, USA, 2
                  Volumes},
  pages        = {413--418},
  publisher    = {{CSREA} Press},
  year         = {2010},
  timestamp    = {Fri, 10 Dec 2010 11:46:08 +0100},
  biburl       = {https://dblp.org/rec/conf/csreaSAM/MohammedCVHA10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/MohammedCVHB10,
  author       = {Mohssen M. Z. E. Mohammed and
                  H. Anthony Chan and
                  Neco Ventura and
                  Mohsin Hashim and
                  Eihab Bashier},
  title        = {Fast and accurate detection for polymorphic worms},
  booktitle    = {5th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2010, London, United Kingdom, November 8-10, 2010},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://ieeexplore.ieee.org/document/5678546/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/MohammedCVHB10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/KongJGZLX10,
  author       = {Deguang Kong and
                  Yoon{-}chan Jhi and
                  Tao Gong and
                  Sencun Zhu and
                  Peng Liu and
                  Hongsheng Xi},
  editor       = {Sushil Jajodia and
                  Jianying Zhou},
  title        = {{SAS:} Semantics Aware Signature Generation for Polymorphic Worm Detection},
  booktitle    = {Security and Privacy in Communication Networks - 6th Iternational
                  {ICST} Conference, SecureComm 2010, Singapore, September 7-9, 2010.
                  Proceedings},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {50},
  pages        = {1--19},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-16161-2\_1},
  doi          = {10.1007/978-3-642-16161-2\_1},
  timestamp    = {Sun, 07 Jan 2018 16:52:46 +0100},
  biburl       = {https://dblp.org/rec/conf/securecomm/KongJGZLX10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/TangXL09,
  author       = {Yong Tang and
                  Bin Xiao and
                  Xicheng Lu},
  title        = {Using a bioinformatics approach to generate accurate exploit-based
                  signatures for polymorphic worms},
  journal      = {Comput. Secur.},
  volume       = {28},
  number       = {8},
  pages        = {827--842},
  year         = {2009},
  url          = {https://doi.org/10.1016/j.cose.2009.06.003},
  doi          = {10.1016/J.COSE.2009.06.003},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/TangXL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eswa/SunC09a,
  author       = {Wen{-}Chen Sun and
                  Yi{-}Ming Chen},
  title        = {A rough set approach for automatic key attributes identification of
                  zero-day polymorphic worms},
  journal      = {Expert Syst. Appl.},
  volume       = {36},
  number       = {3},
  pages        = {4672--4679},
  year         = {2009},
  url          = {https://doi.org/10.1016/j.eswa.2008.06.037},
  doi          = {10.1016/J.ESWA.2008.06.037},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/eswa/SunC09a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tc/StephensonS09,
  author       = {Bradley Stephenson and
                  Biplab Sikdar},
  title        = {A Quasi-Species Model for the Propagation and Containment of Polymorphic
                  Worms},
  journal      = {{IEEE} Trans. Computers},
  volume       = {58},
  number       = {9},
  pages        = {1289--1296},
  year         = {2009},
  url          = {https://doi.org/10.1109/TC.2009.63},
  doi          = {10.1109/TC.2009.63},
  timestamp    = {Tue, 18 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tc/StephensonS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/TataraHS09,
  author       = {Kohei Tatara and
                  Yoshiaki Hori and
                  Kouichi Sakurai},
  title        = {Polymorphic Worm Detection by Analyzing Maximum Length of Instruction
                  Sequence in Network Packets},
  booktitle    = {Proceedings of the The Forth International Conference on Availability,
                  Reliability and Security, {ARES} 2009, March 16-19, 2009, Fukuoka,
                  Japan},
  pages        = {972--977},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/ARES.2009.103},
  doi          = {10.1109/ARES.2009.103},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/TataraHS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csreaSAM/MohammedCVHA09,
  author       = {Mohssen M. Z. E. Mohammed and
                  H. Anthony Chan and
                  Neco Ventura and
                  Mohsin Hashim and
                  Izzeldin Amin},
  editor       = {Hamid R. Arabnia and
                  Kevin Daimi},
  title        = {A modified Knuth-Morris-Pratt Algorithm for Zero-day Polymorphic Worms
                  Detection},
  booktitle    = {Proceedings of the 2009 International Conference on Security {\&}
                  Management, {SAM} 2009, July 13-16, 2009, Las Vegas Nevada, USA, 2
                  Volumes},
  pages        = {652--657},
  publisher    = {{CSREA} Press},
  year         = {2009},
  timestamp    = {Wed, 30 Dec 2009 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csreaSAM/MohammedCVHA09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hpcc/WangWSC09,
  author       = {Jie Wang and
                  Jianxin Wang and
                  Yu Sheng and
                  Jianer Chen},
  title        = {Polymorphic Worm Detection Using Signatures Based on Neighborhood
                  Relation},
  booktitle    = {11th {IEEE} International Conference on High Performance Computing
                  and Communications, {HPCC} 2009, 25-27 June 2009, Seoul, Korea},
  pages        = {347--353},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/HPCC.2009.59},
  doi          = {10.1109/HPCC.2009.59},
  timestamp    = {Mon, 10 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hpcc/WangWSC09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/WangWCZ09,
  author       = {Jie Wang and
                  Jianxin Wang and
                  Jianer Chen and
                  Xi Zhang},
  title        = {An Automated Signature Generation Approach for Polymorphic Worm Based
                  on Color Coding},
  booktitle    = {Proceedings of {IEEE} International Conference on Communications,
                  {ICC} 2009, Dresden, Germany, 14-18 June 2009},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICC.2009.5198721},
  doi          = {10.1109/ICC.2009.5198721},
  timestamp    = {Tue, 12 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icc/WangWCZ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icsea/MohammedCVHA09,
  author       = {Mohssen M. Z. E. Mohammed and
                  H. Anthony Chan and
                  Neco Ventura and
                  Mohsin Hashim and
                  Izzeldin Amin},
  editor       = {Kenneth Boness and
                  Jo{\~{a}}o M. Fernandes and
                  Jon G. Hall and
                  Ricardo Jorge Machado and
                  Roy Oberhauser},
  title        = {Polymorphic Worm Detection Using Double-Honeynet},
  booktitle    = {The Fourth International Conference on Software Engineering Advances,
                  {ICSEA} 2009, 20-25 September 2009, Porto, Portugal},
  pages        = {401--406},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICSEA.2009.64},
  doi          = {10.1109/ICSEA.2009.64},
  timestamp    = {Wed, 09 Aug 2023 08:39:52 +0200},
  biburl       = {https://dblp.org/rec/conf/icsea/MohammedCVHA09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/broadcom/MohammedC08,
  author       = {Mohssen M. Z. E. Mohammed and
                  H. Anthony Chan},
  editor       = {Johnson I. Agbinya and
                  Elmarie Biermann and
                  Yskandar Hamam and
                  Ntsibane Ntlatlapa and
                  Keith Ferguson},
  title        = {Fast Automated Signature Generation for Polymorphic Worms Using Double-Honeynet},
  booktitle    = {2008 Third International Conference on Broadband Communications, Information
                  Technology {\&} Biomedical Applications, BroadCom 2008, 23-26
                  November 2008, Pretoria, Gauteng, South Africa},
  pages        = {142--147},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/BROADCOM.2008.21},
  doi          = {10.1109/BROADCOM.2008.21},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/broadcom/MohammedC08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icse/CavallaroLMM08,
  author       = {Lorenzo Cavallaro and
                  Andrea Lanzi and
                  Luca Mayer and
                  Mattia Monga},
  editor       = {Bart De Win and
                  Seok{-}Won Lee and
                  Mattia Monga},
  title        = {{LISABETH:} automated content-based signature generator for zero-day
                  polymorphic worms},
  booktitle    = {Proceedings of the Fourth International Workshop on Software Engineering
                  for Secure Systems, {SESS} 2008, Leipzig, Germany, May 17-18, 2008},
  pages        = {41--48},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1370905.1370911},
  doi          = {10.1145/1370905.1370911},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icse/CavallaroLMM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mue/TataraHS08,
  author       = {Kohei Tatara and
                  Yoshiaki Hori and
                  Kouichi Sakurai},
  title        = {Analyzing Maximum Length of Instruction Sequence in Network Packets
                  for Polymorphic Worm Detection},
  booktitle    = {2008 International Conference on Multimedia and Ubiquitous Engineering
                  {(MUE} 2008), 24-26 April 2008, Busan, Korea},
  pages        = {485--489},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/MUE.2008.119},
  doi          = {10.1109/MUE.2008.119},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mue/TataraHS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tpds/TangC07,
  author       = {Yong Tang and
                  Shigang Chen},
  title        = {An Automated Signature-Based Approach against Polymorphic Internet
                  Worms},
  journal      = {{IEEE} Trans. Parallel Distributed Syst.},
  volume       = {18},
  number       = {7},
  pages        = {879--892},
  year         = {2007},
  url          = {https://doi.org/10.1109/TPDS.2007.1050},
  doi          = {10.1109/TPDS.2007.1050},
  timestamp    = {Thu, 12 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tpds/TangC07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/GundyCSV07,
  author       = {Matthew Van Gundy and
                  Hao Chen and
                  Zhendong Su and
                  Giovanni Vigna},
  title        = {Feature Omission Vulnerabilities: Thwarting Signature Generation for
                  Polymorphic Worms},
  booktitle    = {23rd Annual Computer Security Applications Conference {(ACSAC} 2007),
                  December 10-14, 2007, Miami Beach, Florida, {USA}},
  pages        = {74--85},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/ACSAC.2007.42},
  doi          = {10.1109/ACSAC.2007.42},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/GundyCSV07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/atc/TangLX07,
  author       = {Yong Tang and
                  Xicheng Lu and
                  Bin Xiao},
  editor       = {Bin Xiao and
                  Laurence Tianruo Yang and
                  Jianhua Ma and
                  Christian M{\"{u}}ller{-}Schloer and
                  Yu Hua},
  title        = {Generating Simplified Regular Expression Signatures for Polymorphic
                  Worms},
  booktitle    = {Autonomic and Trusted Computing, 4th International Conference, {ATC}
                  2007, Hong Kong, China, July 11-13, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4610},
  pages        = {478--488},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-73547-2\_49},
  doi          = {10.1007/978-3-540-73547-2\_49},
  timestamp    = {Thu, 01 Feb 2024 20:40:31 +0100},
  biburl       = {https://dblp.org/rec/conf/atc/TangLX07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccn/RichardsonH07,
  author       = {Theodor Richardson and
                  Chin{-}Tser Huang},
  title        = {Containing Hitlist-Based Worms with Polymorphic Signatures},
  booktitle    = {Proceedings of the 16th International Conference on Computer Communications
                  and Networks, {IEEE} {ICCCN} 2007, Turtle Bay Resort, Honolulu, Hawaii,
                  USA, August 13-16, 2007},
  pages        = {652--657},
  publisher    = {{IEEE}},
  year         = {2007},
  url          = {https://doi.org/10.1109/ICCCN.2007.4317891},
  doi          = {10.1109/ICCCN.2007.4317891},
  timestamp    = {Wed, 16 Oct 2019 14:14:49 +0200},
  biburl       = {https://dblp.org/rec/conf/icccn/RichardsonH07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icnp/LiWCF07,
  author       = {Zhichun Li and
                  Lanjia Wang and
                  Yan Chen and
                  Zhi Fu},
  title        = {Network-based and Attack-resilient Length Signature Generation for
                  Zero-day Polymorphic Worms},
  booktitle    = {Proceedings of the {IEEE} International Conference on Network Protocols,
                  {ICNP} 2007, October 16-19, 2007, Beijing, China},
  pages        = {164--173},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/ICNP.2007.4375847},
  doi          = {10.1109/ICNP.2007.4375847},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icnp/LiWCF07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/woot/GundyBV07,
  author       = {Matthew Van Gundy and
                  Davide Balzarotti and
                  Giovanni Vigna},
  editor       = {Dan Boneh and
                  Tal Garfinkel and
                  Dug Song},
  title        = {Catch Me, If You Can: Evading Network Signatures with Web-based Polymorphic
                  Worms},
  booktitle    = {First {USENIX} Workshop on Offensive Technologies, {WOOT} '07, Boston,
                  MA, USA, August 6, 2007},
  publisher    = {{USENIX} Association},
  year         = {2007},
  url          = {https://www.usenix.org/conference/woot-07/catch-me-if-you-can-evading-network-signatures-web-based-polymorphic-worms},
  timestamp    = {Mon, 01 Feb 2021 08:41:52 +0100},
  biburl       = {https://dblp.org/rec/conf/woot/GundyBV07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ancs/ChenWLZ06,
  author       = {Songqing Chen and
                  Xinyuan Wang and
                  Lei Liu and
                  Xinwen Zhang},
  editor       = {Laxmi N. Bhuyan and
                  Michel Dubois and
                  Will Eatherton},
  title        = {WormTerminator: an effective containment of unknown and polymorphic
                  fast spreading worms},
  booktitle    = {Proceedings of the 2006 {ACM/IEEE} Symposium on Architecture for Networking
                  and Communications Systems, {ANCS} 2006, San Jose, California, USA,
                  December 3-5, 2006},
  pages        = {173--182},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1185347.1185371},
  doi          = {10.1145/1185347.1185371},
  timestamp    = {Fri, 04 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ancs/ChenWLZ06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/StephensonS06,
  author       = {Bradley Stephenson and
                  Biplab Sikdar},
  title        = {A Quasi-Species Approach for Modeling the Dynamics of Polymorphic
                  Worms},
  booktitle    = {{INFOCOM} 2006. 25th {IEEE} International Conference on Computer Communications,
                  Joint Conference of the {IEEE} Computer and Communications Societies,
                  23-29 April 2006, Barcelona, Catalunya, Spain},
  publisher    = {{IEEE}},
  year         = {2006},
  url          = {https://doi.org/10.1109/INFOCOM.2006.93},
  doi          = {10.1109/INFOCOM.2006.93},
  timestamp    = {Tue, 18 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/infocom/StephensonS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigcomm/WangHK006,
  author       = {Jisheng Wang and
                  Ihab Hamadeh and
                  George Kesidis and
                  David J. Miller},
  title        = {Polymorphic worm detection and defense: system design, experimental
                  methodology, and data resources},
  booktitle    = {Proceedings of the 2006 {SIGCOMM} Workshop on Large-Scale Attack Defense,
                  {LSAD} '06, Pisa, Italy, September 11-15, 2006},
  pages        = {169--176},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1162666.1162676},
  doi          = {10.1145/1162666.1162676},
  timestamp    = {Thu, 03 Feb 2022 15:46:18 +0100},
  biburl       = {https://dblp.org/rec/conf/sigcomm/WangHK006.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/LeeKHK06,
  author       = {Ki Hun Lee and
                  Yuna Kim and
                  Sung Je Hong and
                  Jong Kim},
  editor       = {Jae{-}Kwang Lee and
                  Okyeon Yi and
                  Moti Yung},
  title        = {PolyI-D: Polymorphic Worm Detection Based on Instruction Distribution},
  booktitle    = {Information Security Applications, 7th International Workshop, {WISA}
                  2006, Jeju Island, Korea, August 28-30, 2006, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4298},
  pages        = {45--59},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/978-3-540-71093-6\_4},
  doi          = {10.1007/978-3-540-71093-6\_4},
  timestamp    = {Tue, 14 May 2019 10:00:35 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/LeeKHK06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/CrandallSW05,
  author       = {Jedidiah R. Crandall and
                  Zhendong Su and
                  Shyhtsun Felix Wu and
                  Frederic T. Chong},
  editor       = {Vijay Atluri and
                  Catherine Meadows and
                  Ari Juels},
  title        = {On deriving unknown vulnerabilities from zero-day polymorphic and
                  metamorphic worm exploits},
  booktitle    = {Proceedings of the 12th {ACM} Conference on Computer and Communications
                  Security, {CCS} 2005, Alexandria, VA, USA, November 7-11, 2005},
  pages        = {235--248},
  publisher    = {{ACM}},
  year         = {2005},
  url          = {https://doi.org/10.1145/1102120.1102152},
  doi          = {10.1145/1102120.1102152},
  timestamp    = {Tue, 19 Sep 2023 14:44:32 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/CrandallSW05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/KrugelKMRV05,
  author       = {Christopher Kr{\"{u}}gel and
                  Engin Kirda and
                  Darren Mutz and
                  William K. Robertson and
                  Giovanni Vigna},
  editor       = {Alfonso Valdes and
                  Diego Zamboni},
  title        = {Polymorphic Worm Detection Using Structural Information of Executables},
  booktitle    = {Recent Advances in Intrusion Detection, 8th International Symposium,
                  {RAID} 2005, Seattle, WA, USA, September 7-9, 2005, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3858},
  pages        = {207--226},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11663812\_11},
  doi          = {10.1007/11663812\_11},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/KrugelKMRV05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/NewsomeKS05,
  author       = {James Newsome and
                  Brad Karp and
                  Dawn Xiaodong Song},
  title        = {Polygraph: Automatically Generating Signatures for Polymorphic Worms},
  booktitle    = {2005 {IEEE} Symposium on Security and Privacy (S{\&}P 2005), 8-11
                  May 2005, Oakland, CA, {USA}},
  pages        = {226--241},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/SP.2005.15},
  doi          = {10.1109/SP.2005.15},
  timestamp    = {Thu, 21 Sep 2023 15:57:31 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/NewsomeKS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics