フォロー
Daniel Quist
Daniel Quist
確認したメール アドレス: cs.nmt.edu
タイトル
引用先
引用先
Graph-based malware detection using dynamic analysis
B Anderson, D Quist, J Neil, C Storlie, T Lane
Journal in Computer Virology, 1-12, 2011
3672011
Visualizing compiled executables for malware analysis
DA Quist, LM Liebrock
2009 6th International Workshop on Visualization for Cyber Security, 27-32, 2009
1182009
Detecting the presence of virtual machines using the local data table
D Quist, V Smith, O Computing
Offensive Computing 25 (04), 2006
952006
Covert debugging circumventing software armoring techniques
D Quist, V Smith
Black hat briefings USA, 2007
59*2007
Valsmith. Covert debugging circumventing software armoring techniques
D Quist
Black Hat USA, 2007
292007
Stochastic identification of malware with dynamic traces
C Storlie, B Anderson, SV Wiel, D Quist, C Hash, N Brown
The Annals of Applied Statistics, 1-18, 2014
282014
Improving antivirus accuracy with hypervisor assisted analysis
D Quist, L Liebrock, J Neil
Journal in computer virology 7 (2), 121-131, 2011
282011
Reversing Compiled Executables for Malware Analysis via Visualization
DA Quist, LM Liebrock
Information Visualization 10 (2), 117, 2011
132011
Hacking Malware: offense is the new defense
S Smith, D Quist
Retrieved July 24, 2007, 2006
102006
Further down the VM spiral
D Quist, V Smith, O Computing
Offensive Computing, 2006
72006
Further down the VM spiral-detection of full and partial emulation for IA-32 virtual machines
D Quist, V Smith
Proceedings of the Defcon 14, 2006
72006
Temporal reverse engineering
D Quist, C Ames
Blackhat USA. Las Vegas, NV (August 2008), 2008
62008
Detecting the Presence of Virtual Machines Using the Local Data Table, 2006
D Quist, V Smith, O Computing
62006
Offensive computing
D Quist
52012
TerranLane
B Anderson, D Quist, J Neil, C Storlie
Graph-based malware detection using dynamic analysis. Journalin computer …, 2011
52011
Network topology mapper
DA Quist, EM Gavrilov, ME Fisk
US Patent 7,319,677, 2008
52008
Stochastic Identification and Clustering of Malware with Dynamic Traces
CB Storlie, S Vander Wiel, D Quist, B Anderson, C Hash, N Brown
Malware Technical Exchange Meeting 2012, 2012
32012
Detecting code injection attacks in internet explorer
B Anderson, D Quist, T Lane
2011 IEEE 35th Annual Computer Software and Applications Conference …, 2011
32011
VERA version 1.3 user manual and documentation
DA Quist
Los Alamos National Laboratory (LANL), Los Alamos, NM (United States), 2011
12011
Storm Worm Process Injection from the Windows Kernel
D Quist
Offensive Computing), March 9, 2008
12008
現在システムで処理を実行できません。しばらくしてからもう一度お試しください。
論文 1–20