Classification of malware using structured control flow S Cesare, Y Xiang Proceedings of the Eighth Australasian Symposium on Parallel and Distributed …, 2010 | 204 | 2010 |
Control flow-based malware variantdetection S Cesare, Y Xiang, W Zhou IEEE Transactions on Dependable and Secure Computing 11 (4), 307-317, 2013 | 170 | 2013 |
Malwise—an effective and efficient classification system for packed and polymorphic malware S Cesare, Y Xiang, W Zhou IEEE Transactions on Computers 62 (6), 1193-1206, 2012 | 145 | 2012 |
Malware variant detection using similarity search over sets of control flow graphs S Cesare, Y Xiang 2011IEEE 10th International Conference on Trust, Security and Privacy in …, 2011 | 101 | 2011 |
Software Similarity and Classification S Cesare, Y Xiang | 89* | |
A fast flowgraph based classification system for packed and polymorphic malware on the endhost S Cesare, Y Xiang 2010 24th IEEE International Conference on Advanced Information Networking …, 2010 | 79 | 2010 |
Runtime kernel kmem patching S Cesare | 36 | 1998 |
Shared library redirection via ELF PLT infection S Cesare Phrack Magazine 56 (7), 2000 | 28 | 2000 |
Wire--a formal intermediate language for binary analysis S Cesare, Y Xiang 2012 IEEE 11th international conference on trust, security and privacy in …, 2012 | 17 | 2012 |
Eliminating errors in worm propagation models Y Wang, S Wen, S Cesare, W Zhou, Y Xiang IEEE communications letters 15 (9), 1022-1024, 2011 | 15 | 2011 |
The microcosmic model of worm propagation Y Wang, S Wen, S Cesare, W Zhou, Y Xiang The Computer Journal 54 (10), 1700-1720, 2011 | 13 | 2011 |
Linux anti-debugging techniques (fooling the debugger) S Cesare http://www. uebi. net/silvio/linux-anti-debugging. txt, 2003 | 13 | 2003 |
Clonewise–detecting package-level clones using machine learning S Cesare, Y Xiang, J Zhang Security and Privacy in Communication Networks: 9th International ICST …, 2013 | 12 | 2013 |
Breaking the security of physical devices S Cesare Presentation at Blackhat 14, 2014 | 11 | 2014 |
Bugalyze. com-detecting bugs using decompilation and data flow analysis S Cesare BlackHat USA 9, 2013 | 10 | 2013 |
Software birthmark similarity S Cesare, Y Xiang, S Cesare, Y Xiang Software Similarity and Classification, 63-70, 2012 | 8 | 2012 |
Fast automated unpacking and classification of malware S Cesare CQUniversity, 2010 | 8 | 2010 |
Unix ELF parasites and virus S Cesare Unpublished technical report. http://www. big. net. au/silvio/elf-pv. txt, 2021 | 6 | 2021 |
A QoS‐based fine‐grained reputation system in the grid environment Y Cui, M Li, Y Xiang, Y Ren, S Cesare Concurrency and Computation: Practice and Experience 24 (17), 1990-2006, 2012 | 6 | 2012 |
SysCall redirection without modifying the SysCall table S Cesare http://vx. netlux. org/lib/vsc05. html, 1999 | 6 | 1999 |