Heuristic malware detection via basic block comparison F Adkins, L Jones, M Carlisle, J Upchurch 2013 8th International Conference on Malicious and Unwanted Software:" The …, 2013 | 34 | 2013 |
pico-Boo!: How to avoid scaring students away in a CTF competition K Owens, A Fulton, L Jones, M Carlisle | 9* | |
ByteWise: A case study in neural network obfuscation identification L Jones, D Christman, S Banescu, M Carlisle 2018 IEEE 8th Annual Computing and Communication Workshop and Conference …, 2018 | 8 | 2018 |
CARDINAL: similarity analysis to defeat malware compiler variations L Jones, A Sellers, M Carlisle 2016 11th International Conference on Malicious and Unwanted Software …, 2016 | 4 | 2016 |
Flowtables: Program Skeletal Inversion for Defeat of Interprocedural Analysis with Unique Metamorphism L Jones, R Whelan, J Blackthorne, G Baker Proceedings of the 5th Program Protection and Reverse Engineering Workshop, 1-11, 2015 | 2 | 2015 |
Rapid Apperception FV Adkins, LT Jones | | 2015 |