Seguir
Monirul Sharif
Monirul Sharif
Dirección de correo verificada de google.com
Título
Citado por
Citado por
Año
Ether: malware analysis via hardware virtualization extensions
A Dinaburg, P Royal, M Sharif, W Lee
Proceedings of the 15th ACM conference on Computer and communications …, 2008
10672008
Lares: An architecture for secure active monitoring using virtualization
BD Payne, M Carbone, M Sharif, W Lee
2008 IEEE Symposium on Security and Privacy (sp 2008), 233-247, 2008
6842008
Secure in-vm monitoring using hardware virtualization
MI Sharif, W Lee, W Cui, A Lanzi
Proceedings of the 16th ACM conference on Computer and communications …, 2009
4212009
Polymorphic Blending Attacks.
P Fogla, MI Sharif, R Perdisci, OM Kolesnikov, W Lee
USENIX security symposium, 241-256, 2006
3692006
Impeding Malware Analysis Using Conditional Code Obfuscation.
MI Sharif, A Lanzi, JT Giffin, W Lee
NDSS, 2008
3492008
Misleading worm signature generators using deliberate noise injection
R Perdisci, D Dagon, W Lee, P Fogla, M Sharif
2006 IEEE Symposium on Security and Privacy (S&P'06), 15 pp.-31, 2006
3032006
Automatic reverse engineering of malware emulators
M Sharif, A Lanzi, J Giffin, W Lee
2009 30th IEEE Symposium on Security and Privacy, 94-109, 2009
2922009
Eureka: A framework for enabling static malware analysis
M Sharif, V Yegneswaran, H Saidi, P Porras, W Lee
Computer Security-ESORICS 2008: 13th European Symposium on Research in …, 2008
1802008
Worm detection, early warning and response based on local victim information
G Gu, M Sharif, X Qin, D Dagon, W Lee, G Riley
20th Annual Computer Security Applications Conference, 136-145, 2004
1622004
K-Tracer: A System for Extracting Kernel Malware Behavior.
A Lanzi, MI Sharif, W Lee
NDSS, 2009
1552009
Systems and methods for secure in-VM monitoring
MI Sharif, W Lee
US Patent 9,129,106, 2015
712015
Understanding precision in host based intrusion detection: Formal analysis and practical models
M Sharif, K Singh, J Giffin, W Lee
Recent Advances in Intrusion Detection: 10th International Symposium, RAID …, 2007
352007
Input-driven dynamic execution prediction of streaming applications
F Aleen, M Sharif, S Pande
ACM Sigplan Notices 45 (5), 315-324, 2010
222010
Comparative study between analytical models and packet-level worm simulations
MI Sharif, GF Riley, W Lee
Workshop on Principles of Advanced and Distributed Simulation (PADS'05), 88-98, 2005
192005
Robust and efficient malware analysis and host-based monitoring
MI Sharif
Georgia Institute of Technology, 2010
112010
Eureka: A framework for enabling static analysis on malware
M Sharif, V Yegneswaran, H Saidi, P Porras
Proceedings of the 13th European Symposium on Research in Computer Security …, 2008
82008
Rotalumé: A tool for automatically reverse engineering malware emulators
M Sharif, A Lanzi, J Giffin, W Lee
Technical Report GT-CS-09-05, School of Computer Science, Georgia Institute …, 2009
52009
On the Need for Packet–Level Details in Worm Simulations
MI Sharif, GF Riley, W Lee
Article (CrossRef Link), 1-9, 0
1
Simulating Internet Worms
GF Riley¹, MI Sharif, W Lee
The IEEE Computer Society's 12th Annual International Symposium on Modeling …, 2004
2004
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–19