Dhilung Kirat
Dhilung Kirat
Research Scientist, IBM Research
Email verificata su us.ibm.com - Home page
TitoloCitata daAnno
BareCloud: Bare-metal Analysis-based Evasive Malware Detection
D Kirat, G Vigna, C Kruegel
USENIX Security 2014, 2014
1742014
Barebox: efficient malware analysis on bare-metal
D Kirat, G Vigna, C Kruegel
Proceedings of the 27th Annual Computer Security Applications Conference …, 2011
862011
Malgene: Automatic extraction of malware analysis evasion signature
D Kirat, G Vigna
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
522015
Baredroid: Large-scale analysis of android apps on real devices
S Mutti, Y Fratantonio, A Bianchi, L Invernizzi, J Corbetta, D Kirat, ...
Proceedings of the 31st Annual Computer Security Applications Conference, 71-80, 2015
502015
Ten years of ictf: The good, the bad, and the ugly
G Vigna, K Borgolte, J Corbetta, A Doupe, Y Fratantonio, L Invernizzi, ...
2014 {USENIX} Summit on Gaming, Games, and Gamification in Security …, 2014
362014
Sigmal: A static signal processing based malware triage
D Kirat, L Nataraj, G Vigna, BS Manjunath
Proceedings of the 29th Annual Computer Security Applications Conference, 89-98, 2013
352013
BAYWATCH: robust beaconing detection to identify infected hosts in large-scale enterprise networks
X Hu, J Jang, MP Stoecklin, T Wang, DL Schales, D Kirat, JR Rao
2016 46th Annual IEEE/IFIP International Conference on Dependable Systems …, 2016
102016
SARVAM: Search And RetrieVAl of Malware
L Nataraj, D Kirat, BS Manjunath, G Vigna
ACSAC NGMAD 2013, 2013
102013
Scalable malware classification with multifaceted content features and threat intelligence
X Hu, J Jang, T Wang, Z Ashraf, MP Stoecklin, D Kirat
IBM Journal of Research and Development 60 (4), 6: 1-6: 11, 2016
92016
Cognitive offense analysis using enriched graphs
J Jang, DH Kirat, Y Park, MP Stoecklin
US Patent App. 15/236,582, 2018
42018
Scalable analytics to detect DNS misuse for establishing stealthy communication channels
DL Schales, J Jang, T Wang, X Hu, D Kirat, B Wuest, MP Stoecklin
IBM Journal of Research and Development 60 (4), 3: 1-3: 14, 2016
32016
Cognitive offense analysis using contextual data and knowledge graphs
WA Bird, SC Deffeyes, J Jang, D Kirat, Y Park, JR Rao, MP Stoecklin
US Patent App. 15/236,575, 2018
12018
Scalable automated evasive malware analysis
DH Kirat
University of California, Santa Barbara, 2015
12015
Corroborating threat assertions by consolidating security and threat intelligence with kinetics data
J Jang, DH Kirat, Y Park, MP Stoecklin
US Patent App. 15/848,337, 2019
2019
Cognitive offense analysis using enriched graphs
J Jang, DH Kirat, Y Park, MP Stoecklin
US Patent App. 10/313,365, 2019
2019
Deactivating evasive malware
Z Gu, H Huang, J Jang, DH Kirat, X Shu, MP Stoecklin, J Zhang
US Patent App. 15/726,660, 2019
2019
Detecting malicious beaconing communities using lockstep detection and co-occurrence graph
J Jang, DH Kirat, BJ Kwon, DL Schales, MP Stoecklin
US Patent App. 15/626,767, 2018
2018
Feedback-based prioritized cognitive analysis
J Jang, DH Kirat, MP Stoecklin
US Patent App. 15/623,062, 2018
2018
Protecting computer systems from malicious usb devices via a usb firewall
A Beitler, J Jang, DH Kirat, A Kurmus, M Neugschwandtner, MP Stoecklin
US Patent App. 15/461,638, 2018
2018
DeepLocker - Concealing Targeted Attacks with AI Locksmithing
D Kirat, J Jang, MP Stoecklin
Black Hat USA 2018, 2018
2018
Il sistema al momento non può eseguire l'operazione. Riprova più tardi.
Articoli 1–20