Graph-based malware detection using dynamic analysis B Anderson, D Quist, J Neil, C Storlie, T Lane Journal in Computer Virology, 1-12, 2011 | 381 | 2011 |
Visualizing compiled executables for malware analysis DA Quist, LM Liebrock 2009 6th International Workshop on Visualization for Cyber Security, 27-32, 2009 | 124 | 2009 |
Detecting the presence of virtual machines using the local data table D Quist, V Smith, O Computing Offensive Computing 25 (04), 2006 | 94 | 2006 |
Covert debugging circumventing software armoring techniques D Quist, V Smith Black Hat, 2007 | 58* | 2007 |
Stochastic identification of malware with dynamic traces C Storlie, B Anderson, SV Wiel, D Quist, C Hash, N Brown The Annals of Applied Statistics, 1-18, 2014 | 28 | 2014 |
Valsmith. Covert debugging circumventing software armoring techniques D Quist Black Hat USA, 2007 | 28 | 2007 |
Improving antivirus accuracy with hypervisor assisted analysis D Quist, L Liebrock, J Neil Journal in computer virology 7 (2), 121-131, 2011 | 27 | 2011 |
Reversing Compiled Executables for Malware Analysis via Visualization DA Quist, LM Liebrock Information Visualization 10 (2), 117, 2011 | 13 | 2011 |
Hacking Malware: offense is the new defense S Smith, D Quist Retrieved July 24, 2007, 2006 | 10 | 2006 |
Further down the VM spiral D Quist, V Smith, O Computing Offensive Computing, 2006 | 7 | 2006 |
Further down the VM spiral-detection of full and partial emulation for IA-32 virtual machines D Quist, V Smith Proceedings of the Defcon 14, 2006 | 7 | 2006 |
Temporal reverse engineering D Quist, C Ames Blackhat USA. Las Vegas, NV (August 2008), 2008 | 6 | 2008 |
Detecting the Presence of Virtual Machines Using the Local Data Table, 2006 D Quist, V Smith, O Computing | 6 | 2006 |
Offensive computing D Quist | 5 | 2012 |
Network topology mapper DA Quist, EM Gavrilov, ME Fisk US Patent 7,319,677, 2008 | 5 | 2008 |
Detecting code injection attacks in internet explorer B Anderson, D Quist, T Lane 2011 IEEE 35th Annual Computer Software and Applications Conference …, 2011 | 4 | 2011 |
TerranLane B Anderson, D Quist, J Neil, C Storlie Graph-based malware detection using dynamic analysis. Journalin Computer …, 2011 | 4 | 2011 |
Stochastic Identification and Clustering of Malware with Dynamic Traces CB Storlie, S Vander Wiel, D Quist, B Anderson, C Hash, N Brown Malware Technical Exchange Meeting 2012, 2012 | 3 | 2012 |
VERA version 1.3 user manual and documentation DA Quist Los Alamos National Laboratory (LANL), Los Alamos, NM (United States), 2011 | 2 | 2011 |
Storm Worm Process Injection from the Windows Kernel D Quist Offensive Computing), March 9, 2008 | 1 | 2008 |