1. [1] Barabosch, T., Bergmann, N., Dombeck, A. and Padilla, E.: Quincy: Detecting Host-Based Code Injection Attacks in Memory Dumps, Detection of Intrusions and Malware, and Vulnerability Assessment, Polychronakis, M. and Meier, M. (Eds.), Cham, Springer International Publishing, pp.209-229 (2017).
2. [2] Barabosch, T., Eschweiler, S. and Gerhards-Padilla, E.: Bee Master: Detecting Host-Based Code Injection Attacks, Detection of Intrusions and Malware, and Vulnerability Assessment, Dietrich, S. (Ed.), Cham, Springer International Publishing, pp.235-254 (2014).
3. [3] Bayer, U., Habibi, I., Balzarotti, D., Kirda, E. and Kruegel, C.: A View on Current Malware Behaviors, Proc. 2nd USENIX Conference on Large-scale Exploits and Emergent Threats: Botnets, Spyware, Worms, and More, LEET'09, p.8, USENIX Association (online), available from <http://dl.acm.org/citation.cfm?id=1855676.1855684> (2009).
4. [4] Bayer, U., Kruegel, C. and Kirda, E.: TTAnalyze: A Tool for Analyzing Malware, Proc. European Institute for Computer Antivirus Research Annual Conference (2006).
5. [5] Bellard, F.: QEMU, a Fast and Portable Dynamic Translator, USENIX Annual Technical Conference, FREENIX Track, pp.41-46, USENIX (2005).