메뉴 건너뛰기




Volumn , Issue , 2003, Pages 76-82

Detection of injected, dynamically generated, and obfuscated malicious code

Author keywords

Anomaly detection; Code analysis; Dynamic analysis; Execution monitoring; Intrusion detection; Malicious code detection; Static analysis; System calls

Indexed keywords

CODES (SYMBOLS); COMPUTER NETWORKS; COMPUTER OPERATING SYSTEMS; COMPUTER SOFTWARE; COMPUTER VIRUSES; FINITE AUTOMATA; INTEROPERABILITY; MATHEMATICAL MODELS; PROGRAM COMPILERS; SECURITY OF DATA;

EID: 18844437024     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/948187.948201     Document Type: Conference Paper
Times cited : (67)

References (15)
  • 2
    • 34250637420 scopus 로고    scopus 로고
    • Static analysis of binary code to isolate malicious behaviours
    • Bergeron, J., M. Debbabi, M.M. Erhioui, and B. Ktari. Static Analysis of Binary Code to Isolate Malicious Behaviours. In WET ICE 99. 1999.
    • (1999) WET ICE 99
    • Bergeron, J.1    Debbabi, M.2    Erhioui, M.M.3    Ktari, B.4
  • 7
    • 84871140130 scopus 로고    scopus 로고
    • Data Rescue. IDA Pro Disassembler. http://www.datarescue.com/idabase/
    • IDA Pro Disassembler
  • 15


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.