Standard
On the Limits of Information Flow Techniques for Malware Analysis and Containment. / Cavallaro, Lorenzo; Saxena, Prateek; Sekar, R.
Detection of Intrusions and Malware, and Vulnerability Assessment: 5th International Conference, DIMVA 2008, Paris, France, July 10-11, 2008: Proceedings. ed. / Diego Zamboni. Springer, 2008. p. 143-163 (Lecture Notes in Computer Science; Vol. 5137).
Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
Harvard
Cavallaro, L, Saxena, P & Sekar, R 2008,
On the Limits of Information Flow Techniques for Malware Analysis and Containment. in D Zamboni (ed.),
Detection of Intrusions and Malware, and Vulnerability Assessment: 5th International Conference, DIMVA 2008, Paris, France, July 10-11, 2008: Proceedings. Lecture Notes in Computer Science, vol. 5137, Springer, pp. 143-163.
https://doi.org/10.1007/978-3-540-70542-0_8
APA
Cavallaro, L., Saxena, P., & Sekar, R. (2008).
On the Limits of Information Flow Techniques for Malware Analysis and Containment. In D. Zamboni (Ed.),
Detection of Intrusions and Malware, and Vulnerability Assessment: 5th International Conference, DIMVA 2008, Paris, France, July 10-11, 2008: Proceedings (pp. 143-163). (Lecture Notes in Computer Science; Vol. 5137). Springer.
https://doi.org/10.1007/978-3-540-70542-0_8
Vancouver
Cavallaro L, Saxena P, Sekar R.
On the Limits of Information Flow Techniques for Malware Analysis and Containment. In Zamboni D, editor, Detection of Intrusions and Malware, and Vulnerability Assessment: 5th International Conference, DIMVA 2008, Paris, France, July 10-11, 2008: Proceedings. Springer. 2008. p. 143-163. (Lecture Notes in Computer Science).
https://doi.org/10.1007/978-3-540-70542-0_8
Author
Cavallaro, Lorenzo ; Saxena, Prateek ; Sekar, R. /
On the Limits of Information Flow Techniques for Malware Analysis and Containment. Detection of Intrusions and Malware, and Vulnerability Assessment: 5th International Conference, DIMVA 2008, Paris, France, July 10-11, 2008: Proceedings. editor / Diego Zamboni. Springer, 2008. pp. 143-163 (Lecture Notes in Computer Science).
BibTeX
@inproceedings{6091f1827bf74fa8b7154f75f2247c79,
title = "On the Limits of Information Flow Techniques for Malware Analysis and Containment",
author = "Lorenzo Cavallaro and Prateek Saxena and R. Sekar",
year = "2008",
month = jul,
day = "10",
doi = "10.1007/978-3-540-70542-0_8",
language = "English",
isbn = "978-3-540-70541-3",
series = "Lecture Notes in Computer Science",
publisher = "Springer",
pages = "143--163",
editor = "Diego Zamboni",
booktitle = "Detection of Intrusions and Malware, and Vulnerability Assessment: 5th International Conference, DIMVA 2008, Paris, France, July 10-11, 2008: Proceedings",
}
RIS
TY - GEN
T1 - On the Limits of Information Flow Techniques for Malware Analysis and Containment
AU - Cavallaro, Lorenzo
AU - Saxena, Prateek
AU - Sekar, R.
PY - 2008/7/10
Y1 - 2008/7/10
U2 - 10.1007/978-3-540-70542-0_8
DO - 10.1007/978-3-540-70542-0_8
M3 - Conference contribution
SN - 978-3-540-70541-3
T3 - Lecture Notes in Computer Science
SP - 143
EP - 163
BT - Detection of Intrusions and Malware, and Vulnerability Assessment: 5th International Conference, DIMVA 2008, Paris, France, July 10-11, 2008: Proceedings
A2 - Zamboni, Diego
PB - Springer
ER -