Follow
Monirul Sharif
Monirul Sharif
Verified email at google.com
Title
Cited by
Cited by
Year
Ether: malware analysis via hardware virtualization extensions
A Dinaburg, P Royal, M Sharif, W Lee
Proceedings of the 15th ACM conference on Computer and communications …, 2008
10802008
Lares: An architecture for secure active monitoring using virtualization
BD Payne, M Carbone, M Sharif, W Lee
2008 IEEE Symposium on Security and Privacy (sp 2008), 233-247, 2008
6912008
Secure in-vm monitoring using hardware virtualization
MI Sharif, W Lee, W Cui, A Lanzi
Proceedings of the 16th ACM conference on Computer and communications …, 2009
4252009
Polymorphic Blending Attacks.
P Fogla, MI Sharif, R Perdisci, OM Kolesnikov, W Lee
USENIX security symposium, 241-256, 2006
3792006
Impeding Malware Analysis Using Conditional Code Obfuscation.
MI Sharif, A Lanzi, JT Giffin, W Lee
NDSS, 2008
3592008
Misleading worm signature generators using deliberate noise injection
R Perdisci, D Dagon, W Lee, P Fogla, M Sharif
2006 IEEE Symposium on Security and Privacy (S&P'06), 15 pp.-31, 2006
3172006
Automatic reverse engineering of malware emulators
M Sharif, A Lanzi, J Giffin, W Lee
2009 30th IEEE Symposium on Security and Privacy, 94-109, 2009
2972009
Eureka: A framework for enabling static malware analysis
M Sharif, V Yegneswaran, H Saidi, P Porras, W Lee
Computer Security-ESORICS 2008: 13th European Symposium on Research in …, 2008
1922008
Worm detection, early warning and response based on local victim information
G Gu, M Sharif, X Qin, D Dagon, W Lee, G Riley
20th Annual Computer Security Applications Conference, 136-145, 2004
1612004
K-Tracer: A System for Extracting Kernel Malware Behavior.
A Lanzi, MI Sharif, W Lee
NDSS, 2009
1552009
Systems and methods for secure in-VM monitoring
MI Sharif, W Lee
US Patent 9,129,106, 2015
722015
Understanding precision in host based intrusion detection: Formal analysis and practical models
M Sharif, K Singh, J Giffin, W Lee
Recent Advances in Intrusion Detection: 10th International Symposium, RAID …, 2007
362007
Input-driven dynamic execution prediction of streaming applications
F Aleen, M Sharif, S Pande
ACM Sigplan Notices 45 (5), 315-324, 2010
222010
Comparative study between analytical models and packet-level worm simulations
MI Sharif, GF Riley, W Lee
Workshop on Principles of Advanced and Distributed Simulation (PADS'05), 88-98, 2005
192005
Robust and efficient malware analysis and host-based monitoring
MI Sharif
Georgia Institute of Technology, 2010
102010
Eureka: A framework for enabling static analysis on malware
M Sharif, V Yegneswaran, H Saidi, P Porras
Proceedings of the 13th European Symposium on Research in Computer Security …, 2008
82008
Rotalumé: A tool for automatically reverse engineering malware emulators
M Sharif, A Lanzi, J Giffin, W Lee
Technical Report GT-CS-09-05, School of Computer Science, Georgia Institute …, 2009
52009
On the Need for Packet–Level Details in Worm Simulations
MI Sharif, GF Riley, W Lee
Article (CrossRef Link), 1-9, 0
1
Simulating Internet Worms
GF Riley¹, MI Sharif, W Lee
The IEEE Computer Society's 12th Annual International Symposium on Modeling …, 2004
2004
The system can't perform the operation now. Try again later.
Articles 1–19