Published in: Dagstuhl Reports, Volume 7, Issue 7 (2018)
Sarah Zennou, Saumya K. Debray, Thomas Dullien, and Arun Lakhothia. Malware Analysis: From Large-Scale Data Triage to Targeted Attack Recognition (Dagstuhl Seminar 17281). In Dagstuhl Reports, Volume 7, Issue 7, pp. 44-53, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2018)
@Article{zennou_et_al:DagRep.7.7.44,
author = {Zennou, Sarah and Debray, Saumya K. and Dullien, Thomas and Lakhothia, Arun},
title = {{Malware Analysis: From Large-Scale Data Triage to Targeted Attack Recognition (Dagstuhl Seminar 17281)}},
pages = {44--53},
journal = {Dagstuhl Reports},
ISSN = {2192-5283},
year = {2018},
volume = {7},
number = {7},
editor = {Zennou, Sarah and Debray, Saumya K. and Dullien, Thomas and Lakhothia, Arun},
publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik},
address = {Dagstuhl, Germany},
URL = {https://drops.dagstuhl.de/entities/document/10.4230/DagRep.7.7.44},
URN = {urn:nbn:de:0030-drops-84222},
doi = {10.4230/DagRep.7.7.44},
annote = {Keywords: big data, executable analysis, machine learning, malware, obfuscation, reverse engineering}
}
Published in: Dagstuhl Reports, Volume 4, Issue 6 (2015)
Roberto Giacobazzi, Axel Simon, and Sarah Zennou. Challenges in Analysing Executables: Scalability, Self-Modifying Code and Synergy (Dagstuhl Seminar 14241). In Dagstuhl Reports, Volume 4, Issue 6, pp. 48-63, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2014)
@Article{giacobazzi_et_al:DagRep.4.6.48,
author = {Giacobazzi, Roberto and Simon, Axel and Zennou, Sarah},
title = {{Challenges in Analysing Executables: Scalability, Self-Modifying Code and Synergy (Dagstuhl Seminar 14241)}},
pages = {48--63},
journal = {Dagstuhl Reports},
ISSN = {2192-5283},
year = {2014},
volume = {4},
number = {6},
editor = {Giacobazzi, Roberto and Simon, Axel and Zennou, Sarah},
publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik},
address = {Dagstuhl, Germany},
URL = {https://drops.dagstuhl.de/entities/document/10.4230/DagRep.4.6.48},
URN = {urn:nbn:de:0030-drops-47627},
doi = {10.4230/DagRep.4.6.48},
annote = {Keywords: Executable analysis, reverse engineering, malware detection, control flow reconstruction, emulators, binary instrumentation}
}