You are now leaving the DARPA.mil website that is under the control and management of DARPA. The appearance of hyperlinks does not constitute endorsement by DARPA of non-U.S. Government sites or the information, products, or services contained therein. Although DARPA may or may not use these sites as additional distribution channels for Department of Defense information, it does not exercise editorial control over all of the information that you may find at these locations. Such links are provided consistent with the stated purpose of this website.
After reading this message, click to continue immediately.
The Cyber Defense Program is developing the core computing and networking technologies required to protect DoD's information, information infrastructure, and mission-critical information systems. This includes new cyber-forensic techniques to automate the discovery, identification, and characterization of malware variants and thereby accelerate the development of effective responses.
The content below has been generated by organizations that are partially funded by DARPA; the views and conclusions contained therein are those of the authors and should not be interpreted as necessarily representing the official policies or endorsements, either expressed or implied, of DARPA or the U.S. Government.
Report a problem: firstname.lastname@example.org
Last updated: November 13, 2015
|BAE Systems (publications), Apogee Research (publications), University of North Florida (publications), University of Michigan (publications)||Introduction-Based Routing||Networking, Reputation Management||http://sourceforge.net/projects/introbasedrouting/||Introduction-Based Routing (IBR) is a method for dynamically opening and closing point-to-point virtual private networks (connections) to create a dynamic yet trustworthy network. Connections are created via introduction. The IBR Proxy Server software packet implements IBR. (Java)||GPLv2|
|Invincea Labs, George Mason University||Visualization of Shared System Call Sequence Relationships in Large Malware Corpora||http://www.cse.ohio-state.edu/~raghu/teaching/CSE5544/Visweek2012/vizsec/33-Saxe.pdf|
|Invincea Labs, George Mason University||Mining Web Technical Discussions to Identify Malware Capabilities||http://ieeexplore.ieee.org/xpl/login.jsp?tp=&arnumber=6679853&url=http%3A%2F%2Fieeexplore.ieee.org%2Fxpls%2Fabs_all.jsp%3Farnumber%3D6679853|
|Invincea Labs, George Mason University||Malware Similarity Identification Using Call Graph Based System Call Subsequence Features||http://ieeexplore.ieee.org/xpl/login.jsp?tp=&arnumber=6679854&url=http%3A%2F%2Fieeexplore.ieee.org%2Fxpls%2Fabs_all.jsp%3Farnumber%3D6679854|
|Lockheed Martin-Advanced Technology Laboratories, Carnegie Mellon University||ReDeBug: Finding Unpatched Code Clones in Entire OS Distributions||http://users.ece.cmu.edu/~jiyongj/papers/oakland12.pdf|
|Lockheed Martin-Advanced Technology Laboratories, Carnegie Mellon University||BitShred: Feature Hashing Malware for Scalable Triage and Semantic Analysis||http://www.ece.cmu.edu/~jiyongj/papers/ccs11.pdf|
|Lockheed Martin-Advanced Technology Laboratories, Carnegie Mellon University||Towards Automatic Software Lineage Inference||http://users.ece.cmu.edu/~jiyongj/papers/usenixsec13.pdf|
|Raytheon BBN, Raytheon SI Government Solutions||Inferring Accurate Histories of Malware Evolution from Structural Evidence||https://www.aaai.org/ocs/index.php/FLAIRS/FLAIRS13/paper/view/5884/6082|
|BAE Systems, Apogee Research, University of North Florida, University of Michigan||On Trusting Introductions from a Reputable Source: A Utility-Maximizing Probabilistic Approach||http://www.unf.edu/~n00819483/docs/globalSIP2013_final.pdf|
|BAE Systems, Apogee Research, University of North Florida, University of Michigan||On Optimal Decisions in an Introduction-Based Reputation Protocol||http://ieeexplore.ieee.org/xpl/login.jsp?tp=&arnumber=6638202&url=http%3A%2F%2Fieeexplore.ieee.org%2Fxpls%2Fabs_all.jsp%3Farnumber%3D6638202|
|BAE Systems, Apogee Research, University of North Florida, University of Michigan||Analyzing Incentives for Protocol Compliance in Complex Domains: A Case Study of Introduction-Based Routing||http://weis2013.econinfosec.org/papers/WellmanKimDuongWEIS2013.pdf|
|BAE Systems, Apogee Research, University of North Florida, University of Michigan||A Stochastic Model for Reputation Management in Introduction-Based Trust Systems||http://stoch-nets-2012.lids.mit.edu/posters/Kreidl.pdf|
|BAE Systems, Apogee Research, University of North Florida, University of Michigan||Incentivizing Responsible Networking via Introduction-Based Routing||http://dl.acm.org/citation.cfm?id=2022274|