BareCloud: Bare-metal Analysis-based Evasive Malware Detection D Kirat, G Vigna, C Kruegel USENIX Security 2014, 2014 | 328 | 2014 |
Malgene: Automatic extraction of malware analysis evasion signature D Kirat, G Vigna Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015 | 166 | 2015 |
Barebox: efficient malware analysis on bare-metal D Kirat, G Vigna, C Kruegel Proceedings of the 27th Annual Computer Security Applications Conference …, 2011 | 150 | 2011 |
Baredroid: Large-scale analysis of android apps on real devices S Mutti, Y Fratantonio, A Bianchi, L Invernizzi, J Corbetta, D Kirat, ... Proceedings of the 31st Annual Computer Security Applications Conference, 71-80, 2015 | 85 | 2015 |
Ten Years of {iCTF}: The Good, The Bad, and The Ugly G Vigna, K Borgolte, J Corbetta, A Doupé, Y Fratantonio, L Invernizzi, ... 2014 USENIX Summit on Gaming, Games, and Gamification in Security Education …, 2014 | 85 | 2014 |
Sigmal: A static signal processing based malware triage D Kirat, L Nataraj, G Vigna, BS Manjunath Proceedings of the 29th Annual Computer Security Applications Conference, 89-98, 2013 | 70 | 2013 |
DeepLocker - Concealing Targeted Attacks with AI Locksmithing D Kirat, J Jang, MP Stoecklin Black Hat USA 2018, 2018 | 62 | 2018 |
Deeplocker: How AI can power a stealthy new breed of malware MP Stoecklin, J Jang, D Kirat Security Intelligence 8 (2018), 2018 | 46 | 2018 |
SARVAM: Search And RetrieVAl of Malware L Nataraj, D Kirat, BS Manjunath, G Vigna ACSAC NGMAD 2013, 2013 | 45 | 2013 |
Consolidating structured and unstructured security and threat intelligence with knowledge graphs Y Park, J Jang, DH Kirat, JR Rao, MP Stoecklin US Patent App. 15/368,845, 2018 | 39 | 2018 |
BAYWATCH: robust beaconing detection to identify infected hosts in large-scale enterprise networks X Hu, J Jang, MP Stoecklin, T Wang, DL Schales, D Kirat, JR Rao 2016 46th Annual IEEE/IFIP International Conference on Dependable Systems …, 2016 | 38 | 2016 |
Cognitive offense analysis using contextual data and knowledge graphs WA Bird, SC Deffeyes, J Jang, D Kirat, Y Park, JR Rao, MP Stoecklin US Patent 10,542,015, 2020 | 35 | 2020 |
Optimizing ingestion of structured security information into graph databases for security analytics S Vajipayajula, SC Will, DH Kirat, KK Kapadia, A Tilstra US Patent 11,171,982, 2021 | 25 | 2021 |
Scalable malware classification with multifaceted content features and threat intelligence X Hu, J Jang, T Wang, Z Ashraf, MP Stoecklin, D Kirat IBM Journal of Research and Development 60 (4), 6: 1-6: 11, 2016 | 25 | 2016 |
Optimizing security analyses in SaaS environment KK Kapadia, DH Kirat, Y Park, MP Stoecklin, S Vajipayajula US Patent 10,084,804, 2018 | 24 | 2018 |
Cognitive offense analysis using enriched graphs J Jang, DH Kirat, Y Park, MP Stoecklin US Patent 10,313,365, 2019 | 23 | 2019 |
Cognitive analysis of security data with signal flow-based graph exploration J Jang, DH Kirat, Y Park, MP Stoecklin US Patent 11,089,040, 2021 | 22 | 2021 |
Automated semantic modeling of system events Z Zhu, X Shu, DH Kirat, J Jang, MP Stoecklin US Patent App. 16/711,688, 2021 | 21 | 2021 |
Feedback-based prioritized cognitive analysis J Jang, DH Kirat, MP Stoecklin US Patent 10,681,061, 2020 | 18 | 2020 |
Cognitive analysis of security data with signal flow-based graph exploration J Jang, DH Kirat, Y Park, MP Stoecklin US Patent 10,536,472, 2020 | 18 | 2020 |