Ether: malware analysis via hardware virtualization extensions A Dinaburg, P Royal, M Sharif, W Lee Proceedings of the 15th ACM conference on Computer and communications …, 2008 | 1080 | 2008 |
Lares: An architecture for secure active monitoring using virtualization BD Payne, M Carbone, M Sharif, W Lee 2008 IEEE Symposium on Security and Privacy (sp 2008), 233-247, 2008 | 691 | 2008 |
Secure in-vm monitoring using hardware virtualization MI Sharif, W Lee, W Cui, A Lanzi Proceedings of the 16th ACM conference on Computer and communications …, 2009 | 425 | 2009 |
Polymorphic Blending Attacks. P Fogla, MI Sharif, R Perdisci, OM Kolesnikov, W Lee USENIX security symposium, 241-256, 2006 | 379 | 2006 |
Impeding Malware Analysis Using Conditional Code Obfuscation. MI Sharif, A Lanzi, JT Giffin, W Lee NDSS, 2008 | 359 | 2008 |
Misleading worm signature generators using deliberate noise injection R Perdisci, D Dagon, W Lee, P Fogla, M Sharif 2006 IEEE Symposium on Security and Privacy (S&P'06), 15 pp.-31, 2006 | 317 | 2006 |
Automatic reverse engineering of malware emulators M Sharif, A Lanzi, J Giffin, W Lee 2009 30th IEEE Symposium on Security and Privacy, 94-109, 2009 | 297 | 2009 |
Eureka: A framework for enabling static malware analysis M Sharif, V Yegneswaran, H Saidi, P Porras, W Lee Computer Security-ESORICS 2008: 13th European Symposium on Research in …, 2008 | 192 | 2008 |
Worm detection, early warning and response based on local victim information G Gu, M Sharif, X Qin, D Dagon, W Lee, G Riley 20th Annual Computer Security Applications Conference, 136-145, 2004 | 161 | 2004 |
K-Tracer: A System for Extracting Kernel Malware Behavior. A Lanzi, MI Sharif, W Lee NDSS, 2009 | 155 | 2009 |
Systems and methods for secure in-VM monitoring MI Sharif, W Lee US Patent 9,129,106, 2015 | 72 | 2015 |
Understanding precision in host based intrusion detection: Formal analysis and practical models M Sharif, K Singh, J Giffin, W Lee Recent Advances in Intrusion Detection: 10th International Symposium, RAID …, 2007 | 36 | 2007 |
Input-driven dynamic execution prediction of streaming applications F Aleen, M Sharif, S Pande ACM Sigplan Notices 45 (5), 315-324, 2010 | 22 | 2010 |
Comparative study between analytical models and packet-level worm simulations MI Sharif, GF Riley, W Lee Workshop on Principles of Advanced and Distributed Simulation (PADS'05), 88-98, 2005 | 19 | 2005 |
Robust and efficient malware analysis and host-based monitoring MI Sharif Georgia Institute of Technology, 2010 | 10 | 2010 |
Eureka: A framework for enabling static analysis on malware M Sharif, V Yegneswaran, H Saidi, P Porras Proceedings of the 13th European Symposium on Research in Computer Security …, 2008 | 8 | 2008 |
Rotalumé: A tool for automatically reverse engineering malware emulators M Sharif, A Lanzi, J Giffin, W Lee Technical Report GT-CS-09-05, School of Computer Science, Georgia Institute …, 2009 | 5 | 2009 |
On the Need for Packet–Level Details in Worm Simulations MI Sharif, GF Riley, W Lee Article (CrossRef Link), 1-9, 0 | 1 | |
Simulating Internet Worms GF Riley¹, MI Sharif, W Lee The IEEE Computer Society's 12th Annual International Symposium on Modeling …, 2004 | | 2004 |