2008 |
8 | EE | Artem Dinaburg,
Paul Royal,
Monirul I. Sharif,
Wenke Lee:
Ether: malware analysis via hardware virtualization extensions.
ACM Conference on Computer and Communications Security 2008: 51-62 |
7 | EE | Monirul I. Sharif,
Vinod Yegneswaran,
Hassen Saïdi,
Phillip A. Porras,
Wenke Lee:
Eureka: A Framework for Enabling Static Malware Analysis.
ESORICS 2008: 481-500 |
6 | EE | Bryan D. Payne,
Martim Carbone,
Monirul I. Sharif,
Wenke Lee:
Lares: An Architecture for Secure Active Monitoring Using Virtualization.
IEEE Symposium on Security and Privacy 2008: 233-247 |
2007 |
5 | EE | Monirul I. Sharif,
Kapil Singh,
Jonathon T. Giffin,
Wenke Lee:
Understanding Precision in Host Based Intrusion Detection.
RAID 2007: 21-41 |
2006 |
4 | EE | Roberto Perdisci,
David Dagon,
Wenke Lee,
Prahlad Fogla,
Monirul I. Sharif:
MisleadingWorm Signature Generators Using Deliberate Noise Injection.
IEEE Symposium on Security and Privacy 2006: 17-31 |
2005 |
3 | EE | Monirul I. Sharif,
George F. Riley,
Wenke Lee:
Comparative Study between Analytical Models and Packet-Level Worm Simulations.
PADS 2005: 88-98 |
2004 |
2 | EE | Guofei Gu,
Monirul I. Sharif,
Xinzhou Qin,
David Dagon,
Wenke Lee,
George F. Riley:
Worm Detection, Early Warning and Response Based on Local Victim Information.
ACSAC 2004: 136-145 |
1 | EE | George F. Riley,
Monirul I. Sharif,
Wenke Lee:
Simulating Internet Worms.
MASCOTS 2004: 268-274 |