A Host-Based Approach for Unknown Fast-Spreading Worm Detection and Containment.
ACM Trans. Auton. Adapt. Syst., 2014
Chrome Extensions: Threat Analysis and Countermeasures.
Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012
Botnet with Browser Extensions.
Proceedings of the PASSAT/SocialCom 2011, Privacy, 2011
Multi-level Sandboxing Techniques for Execution-based Stealthy Malware Detection.
PhD thesis, 2010
VirusMeter: Preventing Your Cellphone from Spies.
Proceedings of the Recent Advances in Intrusion Detection, 12th International Symposium, 2009
Exploitation and threat analysis of open mobile devices.
Proceedings of the 2009 ACM/IEEE Symposium on Architecture for Networking and Communications Systems, 2009
Malyzer: Defeating Anti-detection for Application-Level Malware Analysis.
Proceedings of the Applied Cryptography and Network Security, 7th International Conference, 2009
BotTracer: Execution-Based Bot-Like Malware Detection.
Proceedings of the Information Security, 11th International Conference, 2008
WormTerminator: an effective containment of unknown and polymorphic fast spreading worms.
Proceedings of the 2006 ACM/IEEE Symposium on Architecture for Networking and Communications Systems, 2006