Recommended Papers

Egele, M., Scholte, T., Kirda, E., & Kruegel, C. (2012). A survey on automated dynamic malware-analysis techniques and tools. ACM Computing Surveys, 44(2), 1-42.

Conficker and beyond: a large-scale empirical study. (2010). Proceedings of the 26th Annual Computer Security Applications Conference (pp. 151-160). ACM. Retrieved from

Malicious PDF Documents Explained. (2011). IEEE Security Privacy Magazine. IEEE. Retrieved from

Analysis of a Botnet Takeover. (2011). IEEE Security Privacy Magazine. IEEE. Retrieved from

A heuristic approach for detection of obfuscated malware. (2009). 2009 IEEE International Conference on Intelligence and Security Informatics. Ieee. Retrieved from

Exploiting Similarity Between Variants to Defeat Malware. (2007). Proceedings of BlackHat Briefings DC 2007, 1-12. Citeseer. Retrieved from

Malware Obfuscation Techniques: A Brief Survey. (2010). Broadband Wireless Computing Communication and Applications BWCCA 2010 International Conference on.