Follow
Craig Miles
Craig Miles
Offensive Security Research, Amazon
Verified email at craigmil.es - Homepage
Title
Cited by
Cited by
Year
Identifying shared software components to support malware forensics
B Ruttenberg, C Miles, L Kellogg, V Notani, M Howard, C LeDoux, ...
Detection of Intrusions and Malware, and Vulnerability Assessment: 11th …, 2014
492014
Vilo: a rapid learning nearest-neighbor classifier for malware triage
A Lakhotia, A Walenstein, C Miles, A Singh
Journal of Computer Virology and Hacking Techniques 9 (3), 109-123, 2013
432013
VirusBattle: State-of-the-art malware analysis for better cyber threat intelligence
C Miles, A Lakhotia, C LeDoux, A Newsom, V Notani
2014 7th International Symposium on Resilient Control Systems (ISRCS), 1-6, 2014
362014
Instruction embedding for improved obfuscation
C LeDoux, M Sharkey, B Primeaux, C Miles
Proceedings of the 50th annual southeast regional conference, 130-135, 2012
212012
Artificial intelligence based malware analysis
A Pfeffer, B Ruttenberg, L Kellogg, M Howard, C Call, A O'Connor, ...
arXiv preprint arXiv:1704.08716, 2017
182017
Fast model learning for the detection of malicious digital documents
D Scofield, C Miles, S Kuhn
Proceedings of the 7th Software Security, Protection, and Reverse …, 2017
152017
{FuncTracker}: Discovering Shared Code to Aid Malware Forensics
C LeDoux, A Lakhotia, C Miles, V Notani, A Pfeffer
6th USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET 13), 2013
152013
Beyond the hype: A real-world evaluation of the impact and cost of machine learning-based malware detection
RA Bridges, S Oesch, ME Verma, MD Iannacone, KMT Huffer, B Jewell, ...
arXiv preprint arXiv:2012.09214, 2020
82020
An assessment of the usability of machine learning based tools for the security operations center
S Oesch, R Bridges, J Smith, J Beaver, J Goodall, K Huffer, C Miles, ...
2020 International Conferences on Internet of Things (iThings) and IEEE …, 2020
82020
Automated model learning for accurate detection of malicious digital documents
D Scofield, C Miles, S Kuhn
Digital Threats: Research and Practice 1 (3), 1-21, 2020
42020
In situ reuse of logically extracted functional components
C Miles, A Lakhotia, A Walenstein
Journal in Computer Virology, 1-12, 2012
42012
Entity resolution-based malicious file detection
D Scofield, C Miles
US Patent 10,754,950, 2020
22020
Early History of the Computer Virus
C Miles
Prof. Dasgupta’s History of Computer Science The Center for Advanced …, 2012
12012
Elicitation of a Program's Behaviors
CS Miles
University of Louisiana at Lafayette, 2015
2015
MODERN STEGANOGRAPHY: AN OVERVIEW
C Miles
The University of Montana, 2010
2010
The system can't perform the operation now. Try again later.
Articles 1–15