Recommended Papers

Egele, M., Scholte, T., Kirda, E., & Kruegel, C. (2012). A survey on automated dynamic malware-analysis techniques and tools. ACM Computing Surveys, 44(2), 1-42.

Conficker and beyond: a large-scale empirical study. (2010). Proceedings of the 26th Annual Computer Security Applications Conference (pp. 151-160). ACM. Retrieved from http://portal.acm.org/citation.cfm?id=1920285

Malicious PDF Documents Explained. (2011). IEEE Security Privacy Magazine. IEEE. Retrieved from http://www.computer.org/portal/web/csdl/doi/10.1109/MSP.2011.14

Analysis of a Botnet Takeover. (2011). IEEE Security Privacy Magazine. IEEE. Retrieved from http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=5560627

A heuristic approach for detection of obfuscated malware. (2009). 2009 IEEE International Conference on Intelligence and Security Informatics. Ieee. Retrieved from http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=5137328

Exploiting Similarity Between Variants to Defeat Malware. (2007). Proceedings of BlackHat Briefings DC 2007, 1-12. Citeseer. Retrieved from http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.69.2024&rep=rep1&type=pdf

Malware Obfuscation Techniques: A Brief Survey. (2010). Broadband Wireless Computing Communication and Applications BWCCA 2010 International Conference on.

 

MORE TO COME!

SUGGESTIONS WELCOME!