Classification of metamorphic malware using value set analysis.
PhD thesis, 2012
CIS: The Crypto Intelligence System for automatic detection and localization of cryptographic functions in current malware.
Proceedings of the 7th International Conference on Malicious and Unwanted Software, 2012
Banksafe Information Stealer Detection Inside the Web Browser.
Proceedings of the Recent Advances in Intrusion Detection - 14th International Symposium, 2011
On the arms race around botnets - Setting up and taking down botnets.
Proceedings of the 3rd International Conference on Cyber Conflict, 2011
A Case Study in Ethical Decision Making Regarding Remote Mitigation of Botnets.
Proceedings of the Financial Cryptography and Data Security, 2010
NGBPA Next Generation BotNet Protocol Analysis.
Proceedings of the Emerging Challenges for Security, 2009
Classification and detection of metamorphic malware using value set analysis.
Proceedings of the 4th International Conference on Malicious and Unwanted Software, 2009
Finding and extracting crypto routines from malware.
Proceedings of the 28th International Performance Computing and Communications Conference, 2009
Detecting VoIP based DoS attacks at the public safety answering point.
Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, 2008
Improving Channel Estimation for Software Radios.
Proceedings of the Sixth IASTED International Multi-Conference on Wireless and Optical Communications: Conference on Communication Systems and Applications, 2006
Evaluation Architecture for Digital Radio Mondiale Multimedia Applications.
Proceedings of the IASTED International Conference on Communication Systems and Applications, 2005