Efficient software-based fault isolation
SOSP '93 Proceedings of the fourteenth ACM symposium on Operating systems principles
Proceedings of the 24th ACM SIGPLAN-SIGACT symposium on Principles of programming languages
Dependent types in practical programming
Proceedings of the 26th ACM SIGPLAN-SIGACT symposium on Principles of programming languages
JFlow: practical mostly-static information flow control
Proceedings of the 26th ACM SIGPLAN-SIGACT symposium on Principles of programming languages
Securing Java: getting down to business with mobile code
Securing Java: getting down to business with mobile code
From system F to typed assembly language
ACM Transactions on Programming Languages and Systems (TOPLAS)
SASI enforcement of security policies: a retrospective
Proceedings of the 1999 workshop on New security paradigms
ACM Transactions on Information and System Security (TISSEC)
ITS4: A static vulnerability scanner for C and C++ code
ACSAC '00 Proceedings of the 16th Annual Computer Security Applications Conference
IRM Enforcement of Java Stack Inspection
SP '00 Proceedings of the 2000 IEEE Symposium on Security and Privacy
Policy-directed code safety
Neutralizing windows-based malicious mobile code
Proceedings of the 2002 ACM symposium on Applied computing
From the Ground Up: The DIMACS Software Security Workshop
IEEE Security and Privacy
ISSTA '04 Proceedings of the 2004 ACM SIGSOFT international symposium on Software testing and analysis
Learning to detect malicious executables in the wild
Proceedings of the tenth ACM SIGKDD international conference on Knowledge discovery and data mining
Interactive and Probabilistic Proof of Mobile Code Safety
Automated Software Engineering
SESS '05 Proceedings of the 2005 workshop on Software engineering for secure systems—building trustworthy applications
Classification methods in the detection of new malicious emails
Information Sciences—Informatics and Computer Science: An International Journal
Formalising Java RMI with explicit code mobility
OOPSLA '05 Proceedings of the 20th annual ACM SIGPLAN conference on Object-oriented programming, systems, languages, and applications
Learning to Detect and Classify Malicious Executables in the Wild
The Journal of Machine Learning Research
Static analysis of executables to detect malicious patterns
SSYM'03 Proceedings of the 12th conference on USENIX Security Symposium - Volume 12
Formalising Java RMI with explicit code mobility
Theoretical Computer Science
Information Security Applications
Malicious web content detection by machine learning
Expert Systems with Applications: An International Journal
Proceedings of the 2009 International Conference on Hybrid Information Technology
Web service description for mobile phone virus
Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, Culture and Human
Classification methods in the detection of new malicious emails
Information Sciences: an International Journal
A parameter-free hybrid clustering algorithm used for malware categorization
ASID'09 Proceedings of the 3rd international conference on Anti-Counterfeiting, security, and identification in communication
On run-time enforcement of policies
ASIAN'07 Proceedings of the 12th Asian computing science conference on Advances in computer science: computer and network security
Tamper detection marking for object files
MILCOM'03 Proceedings of the 2003 IEEE conference on Military communications - Volume II
Integrity for the In-flight web page based on a fragile watermarking chain scheme
Proceedings of the 5th International Conference on Ubiquitous Information Management and Communication
Hunting distributed malware with the κ-calculus
FCT'11 Proceedings of the 18th international conference on Fundamentals of computation theory
Detecting, validating and characterizing computer infections in the wild
Proceedings of the 2011 ACM SIGCOMM conference on Internet measurement conference
Using fuzzy pattern recognition to detect unknown malicious executables code
FSKD'05 Proceedings of the Second international conference on Fuzzy Systems and Knowledge Discovery - Volume Part I
Towards remote policy enforcement for runtime protection of mobile code using trusted computing
IWSEC'06 Proceedings of the 1st international conference on Security
New malicious code detection using variable length n-grams
ICISS'06 Proceedings of the Second international conference on Information Systems Security
IAAS: an integrity assurance service for web page via a fragile watermarking chain module
Proceedings of the 6th International Conference on Ubiquitous Information Management and Communication
Randomizing smartphone malware profiles against statistical mining techniques
DBSec'12 Proceedings of the 26th Annual IFIP WG 11.3 conference on Data and Applications Security and Privacy
Handling malicious code on control systems
SAFECOMP'07 Proceedings of the 26th international conference on Computer Safety, Reliability, and Security
Applying static analysis to high-dimensional malicious application detection
Proceedings of the 51st ACM Southeast Conference
Malware detection by pruning of parallel ensembles using harmony search
Pattern Recognition Letters
Hi-index | 0.01 |
The accelerating trends of interconnectedness, complexity, and extensibility are aggravating the already-serious threat posed by malicious code. To combat malicious code, these authors argue for creating sound policy about software behavior and enforcing that policy through technological means.