Monirul Islam Sharif

According to our database1, Monirul Islam Sharif authored at least 14 papers between 2004 and 2010.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2010
Robust and efficient malware analysis and host-based monitoring.
PhD thesis, 2010

2009
Automatic Reverse Engineering of Malware Emulators.
Proceedings of the 30th IEEE Symposium on Security and Privacy (SP 2009), 2009

K-Tracer: A System for Extracting Kernel Malware Behavior.
Proceedings of the Network and Distributed System Security Symposium, 2009

Secure in-VM monitoring using hardware virtualization.
Proceedings of the 2009 ACM Conference on Computer and Communications Security, 2009

2008
Lares: An Architecture for Secure Active Monitoring Using Virtualization.
Proceedings of the 2008 IEEE Symposium on Security and Privacy (SP 2008), 2008

Impeding Malware Analysis Using Conditional Code Obfuscation.
Proceedings of the Network and Distributed System Security Symposium, 2008

Eureka: A Framework for Enabling Static Malware Analysis.
Proceedings of the Computer Security, 2008

Ether: malware analysis via hardware virtualization extensions.
Proceedings of the 2008 ACM Conference on Computer and Communications Security, 2008

2007
Understanding Precision in Host Based Intrusion Detection.
Proceedings of the Recent Advances in Intrusion Detection, 10th International Symposium, 2007

2006
Polymorphic Blending Attacks.
Proceedings of the 15th USENIX Security Symposium, Vancouver, BC, Canada, July 31, 2006

MisleadingWorm Signature Generators Using Deliberate Noise Injection.
Proceedings of the 2006 IEEE Symposium on Security and Privacy (S&P 2006), 2006

2005
Comparative Study between Analytical Models and Packet-Level Worm Simulations.
Proceedings of the 19th Workshop on Parallel and Distributed Simulation, 2005

2004
Simulating Internet Worms.
Proceedings of the 12th International Workshop on Modeling, 2004

Worm Detection, Early Warning and Response Based on Local Victim Information.
Proceedings of the 20th Annual Computer Security Applications Conference (ACSAC 2004), 2004


  Loading...