关注
Dhilung Kirat
Dhilung Kirat
Research Scientist, IBM Research
在 us.ibm.com 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
BareCloud: Bare-metal Analysis-based Evasive Malware Detection
D Kirat, G Vigna, C Kruegel
USENIX Security 2014, 2014
3282014
Malgene: Automatic extraction of malware analysis evasion signature
D Kirat, G Vigna
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
1662015
Barebox: efficient malware analysis on bare-metal
D Kirat, G Vigna, C Kruegel
Proceedings of the 27th Annual Computer Security Applications Conference …, 2011
1502011
Baredroid: Large-scale analysis of android apps on real devices
S Mutti, Y Fratantonio, A Bianchi, L Invernizzi, J Corbetta, D Kirat, ...
Proceedings of the 31st Annual Computer Security Applications Conference, 71-80, 2015
852015
Ten Years of {iCTF}: The Good, The Bad, and The Ugly
G Vigna, K Borgolte, J Corbetta, A Doupé, Y Fratantonio, L Invernizzi, ...
2014 USENIX Summit on Gaming, Games, and Gamification in Security Education …, 2014
852014
Sigmal: A static signal processing based malware triage
D Kirat, L Nataraj, G Vigna, BS Manjunath
Proceedings of the 29th Annual Computer Security Applications Conference, 89-98, 2013
702013
DeepLocker - Concealing Targeted Attacks with AI Locksmithing
D Kirat, J Jang, MP Stoecklin
Black Hat USA 2018, 2018
622018
Deeplocker: How AI can power a stealthy new breed of malware
MP Stoecklin, J Jang, D Kirat
Security Intelligence 8 (2018), 2018
462018
SARVAM: Search And RetrieVAl of Malware
L Nataraj, D Kirat, BS Manjunath, G Vigna
ACSAC NGMAD 2013, 2013
452013
Consolidating structured and unstructured security and threat intelligence with knowledge graphs
Y Park, J Jang, DH Kirat, JR Rao, MP Stoecklin
US Patent App. 15/368,845, 2018
392018
BAYWATCH: robust beaconing detection to identify infected hosts in large-scale enterprise networks
X Hu, J Jang, MP Stoecklin, T Wang, DL Schales, D Kirat, JR Rao
2016 46th Annual IEEE/IFIP International Conference on Dependable Systems …, 2016
382016
Cognitive offense analysis using contextual data and knowledge graphs
WA Bird, SC Deffeyes, J Jang, D Kirat, Y Park, JR Rao, MP Stoecklin
US Patent 10,542,015, 2020
352020
Optimizing ingestion of structured security information into graph databases for security analytics
S Vajipayajula, SC Will, DH Kirat, KK Kapadia, A Tilstra
US Patent 11,171,982, 2021
252021
Scalable malware classification with multifaceted content features and threat intelligence
X Hu, J Jang, T Wang, Z Ashraf, MP Stoecklin, D Kirat
IBM Journal of Research and Development 60 (4), 6: 1-6: 11, 2016
252016
Optimizing security analyses in SaaS environment
KK Kapadia, DH Kirat, Y Park, MP Stoecklin, S Vajipayajula
US Patent 10,084,804, 2018
242018
Cognitive offense analysis using enriched graphs
J Jang, DH Kirat, Y Park, MP Stoecklin
US Patent 10,313,365, 2019
232019
Cognitive analysis of security data with signal flow-based graph exploration
J Jang, DH Kirat, Y Park, MP Stoecklin
US Patent 11,089,040, 2021
222021
Automated semantic modeling of system events
Z Zhu, X Shu, DH Kirat, J Jang, MP Stoecklin
US Patent App. 16/711,688, 2021
212021
Feedback-based prioritized cognitive analysis
J Jang, DH Kirat, MP Stoecklin
US Patent 10,681,061, 2020
182020
Cognitive analysis of security data with signal flow-based graph exploration
J Jang, DH Kirat, Y Park, MP Stoecklin
US Patent 10,536,472, 2020
182020
系统目前无法执行此操作,请稍后再试。
文章 1–20