Botzilla: detecting the "phoning home" of malicious software. Rieck, K., Schwenk, G., Limmer, T., Holz, T., & Laskov, P. In Proceedings of the 2010 ACM Symposium on Applied Computing (SAC), Sierre, Switzerland, March 22-26, 2010, pages 1978--1984, 2010. Paper doi bibtex @inproceedings{DBLP:conf/sac/RieckSLHL10,
author = {Konrad Rieck and
Guido Schwenk and
Tobias Limmer and
Thorsten Holz and
Pavel Laskov},
title = {Botzilla: detecting the "phoning home" of malicious software},
booktitle = {Proceedings of the 2010 {ACM} Symposium on Applied Computing (SAC),
Sierre, Switzerland, March 22-26, 2010},
pages = {1978--1984},
year = {2010},
crossref = {DBLP:conf/sac/2010},
url = {http://doi.acm.org/10.1145/1774088.1774506},
doi = {10.1145/1774088.1774506},
timestamp = {Tue, 03 Nov 2015 12:36:38 +0100},
biburl = {http://dblp.org/rec/bib/conf/sac/RieckSLHL10},
bibsource = {dblp computer science bibliography, http://dblp.org}
}
Downloads: 0
{"_id":"sR6SgMtQEvG4EW8BJ","bibbaseid":"rieck-schwenk-limmer-holz-laskov-botzilladetectingthephoninghomeofmalicioussoftware-2010","downloads":0,"creationDate":"2017-09-27T10:54:12.943Z","title":"Botzilla: detecting the \"phoning home\" of malicious software","author_short":["Rieck, K.","Schwenk, G.","Limmer, T.","Holz, T.","Laskov, P."],"year":2010,"bibtype":"inproceedings","biburl":"http://dblp.org/pers/tb2/h/Holz:Thorsten","bibdata":{"bibtype":"inproceedings","type":"inproceedings","author":[{"firstnames":["Konrad"],"propositions":[],"lastnames":["Rieck"],"suffixes":[]},{"firstnames":["Guido"],"propositions":[],"lastnames":["Schwenk"],"suffixes":[]},{"firstnames":["Tobias"],"propositions":[],"lastnames":["Limmer"],"suffixes":[]},{"firstnames":["Thorsten"],"propositions":[],"lastnames":["Holz"],"suffixes":[]},{"firstnames":["Pavel"],"propositions":[],"lastnames":["Laskov"],"suffixes":[]}],"title":"Botzilla: detecting the \"phoning home\" of malicious software","booktitle":"Proceedings of the 2010 ACM Symposium on Applied Computing (SAC), Sierre, Switzerland, March 22-26, 2010","pages":"1978--1984","year":"2010","crossref":"DBLP:conf/sac/2010","url":"http://doi.acm.org/10.1145/1774088.1774506","doi":"10.1145/1774088.1774506","timestamp":"Tue, 03 Nov 2015 12:36:38 +0100","biburl":"http://dblp.org/rec/bib/conf/sac/RieckSLHL10","bibsource":"dblp computer science bibliography, http://dblp.org","bibtex":"@inproceedings{DBLP:conf/sac/RieckSLHL10,\n author = {Konrad Rieck and\n Guido Schwenk and\n Tobias Limmer and\n Thorsten Holz and\n Pavel Laskov},\n title = {Botzilla: detecting the \"phoning home\" of malicious software},\n booktitle = {Proceedings of the 2010 {ACM} Symposium on Applied Computing (SAC),\n Sierre, Switzerland, March 22-26, 2010},\n pages = {1978--1984},\n year = {2010},\n crossref = {DBLP:conf/sac/2010},\n url = {http://doi.acm.org/10.1145/1774088.1774506},\n doi = {10.1145/1774088.1774506},\n timestamp = {Tue, 03 Nov 2015 12:36:38 +0100},\n biburl = {http://dblp.org/rec/bib/conf/sac/RieckSLHL10},\n bibsource = {dblp computer science bibliography, http://dblp.org}\n}\n\n","author_short":["Rieck, K.","Schwenk, G.","Limmer, T.","Holz, T.","Laskov, P."],"key":"DBLP:conf/sac/RieckSLHL10","id":"DBLP:conf/sac/RieckSLHL10","bibbaseid":"rieck-schwenk-limmer-holz-laskov-botzilladetectingthephoninghomeofmalicioussoftware-2010","role":"author","urls":{"Paper":"http://doi.acm.org/10.1145/1774088.1774506"},"downloads":0},"search_terms":["botzilla","detecting","phoning","home","malicious","software","rieck","schwenk","limmer","holz","laskov"],"keywords":[],"authorIDs":[],"dataSources":["nsffQ5pYkGG38Yzs3"]}