Published in: Dagstuhl Reports, Volume 7, Issue 7 (2018)
Sarah Zennou, Saumya K. Debray, Thomas Dullien, and Arun Lakhothia. Malware Analysis: From Large-Scale Data Triage to Targeted Attack Recognition (Dagstuhl Seminar 17281). In Dagstuhl Reports, Volume 7, Issue 7, pp. 44-53, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2018)
@Article{zennou_et_al:DagRep.7.7.44, author = {Zennou, Sarah and Debray, Saumya K. and Dullien, Thomas and Lakhothia, Arun}, title = {{Malware Analysis: From Large-Scale Data Triage to Targeted Attack Recognition (Dagstuhl Seminar 17281)}}, pages = {44--53}, journal = {Dagstuhl Reports}, ISSN = {2192-5283}, year = {2018}, volume = {7}, number = {7}, editor = {Zennou, Sarah and Debray, Saumya K. and Dullien, Thomas and Lakhothia, Arun}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/DagRep.7.7.44}, URN = {urn:nbn:de:0030-drops-84222}, doi = {10.4230/DagRep.7.7.44}, annote = {Keywords: big data, executable analysis, machine learning, malware, obfuscation, reverse engineering} }
Published in: Dagstuhl Reports, Volume 4, Issue 6 (2015)
Roberto Giacobazzi, Axel Simon, and Sarah Zennou. Challenges in Analysing Executables: Scalability, Self-Modifying Code and Synergy (Dagstuhl Seminar 14241). In Dagstuhl Reports, Volume 4, Issue 6, pp. 48-63, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2014)
@Article{giacobazzi_et_al:DagRep.4.6.48, author = {Giacobazzi, Roberto and Simon, Axel and Zennou, Sarah}, title = {{Challenges in Analysing Executables: Scalability, Self-Modifying Code and Synergy (Dagstuhl Seminar 14241)}}, pages = {48--63}, journal = {Dagstuhl Reports}, ISSN = {2192-5283}, year = {2014}, volume = {4}, number = {6}, editor = {Giacobazzi, Roberto and Simon, Axel and Zennou, Sarah}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/DagRep.4.6.48}, URN = {urn:nbn:de:0030-drops-47627}, doi = {10.4230/DagRep.4.6.48}, annote = {Keywords: Executable analysis, reverse engineering, malware detection, control flow reconstruction, emulators, binary instrumentation} }
Feedback for Dagstuhl Publishing