메뉴 건너뛰기




Volumn , Issue , 2004, Pages 326-334

Static Analyzer of Vicious Executables (SAVE)

Author keywords

[No Author keywords available]

Indexed keywords

DATA SEGMENT MODIFICATION; MALWARE DETECTION; METAMORPHIC VERSIONS; STATIC ANALYZER OF VICIOUS EXECUTABLES (SAVE);

EID: 21644475665     PISSN: 10639527     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CSAC.2004.37     Document Type: Conference Paper
Times cited : (192)

References (13)
  • 2
    • 21644473703 scopus 로고    scopus 로고
    • Before the Subcommittee on Technology, Information Policy, Intergovernmental Relations and the Census House Government Reform Committee, September 10
    • G. Eschelbeck, "Worm and Virus Defense: How Can We Protect the Nation's Computers From These Threats?", Before the Subcommittee on Technology, Information Policy, Intergovernmental Relations and the Census House Government Reform Committee, September 10, 2003.
    • (2003) Worm and Virus Defense: How Can We Protect the Nation's Computers from These Threats?
    • Eschelbeck, G.1
  • 3
    • 0023294949 scopus 로고
    • Computer viruses: Theory and experiments
    • F. Cohen, "Computer viruses: Theory and experiments", Computers and Security, Vol. 6, 1987, pp. 22-35.
    • (1987) Computers and Security , vol.6 , pp. 22-35
    • Cohen, F.1
  • 4
  • 6
    • 84924223669 scopus 로고    scopus 로고
    • Static analysis of executables to detect malicious patterns
    • M. Christodorescu and S. Jha, "Static Analysis of Executables to Detect Malicious Patterns", Usenix Security Symposium, 2003, pp. 169-186.
    • (2003) Usenix Security Symposium , pp. 169-186
    • Christodorescu, M.1    Jha, S.2
  • 7
    • 84860961653 scopus 로고    scopus 로고
    • Symantec Cooperation http://securityresponse.symantec.com/avcenter/.
  • 8
    • 84860961691 scopus 로고    scopus 로고
    • Virus Library http://www.viruslibrary.com/virusinfo/Win32.Bika.htm.
  • 9
    • 0036704573 scopus 로고    scopus 로고
    • Watermarking, tamper-proofing, and obfuscation - Tools for software protection
    • Collberg and C. Thomborson, "Watermarking, Tamper-Proofing, and Obfuscation - Tools for Software Protection", IEEE Transactions on Software Engineering Vol. 28:8,2002, pp. 735-746.
    • (2002) IEEE Transactions on Software Engineering , vol.28 , Issue.8 , pp. 735-746
    • Collberg1    Thomborson, C.2
  • 11
    • 84860959972 scopus 로고    scopus 로고
    • Hackman Hex editor, http://www.technologismiki.com/en/index-h.html.
    • Hex, H.1
  • 12
    • 0031755126 scopus 로고    scopus 로고
    • Activity pattern analysis by means of sequence-alignment methods
    • W.C. Wilson, "Activity Pattern Analysis by means of Sequence-Alignment Methods", Journal of Environment and planning, Vol. 30, 1998, pp. 1017-1038.
    • (1998) Journal of Environment and Planning , vol.30 , pp. 1017-1038
    • Wilson, W.C.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.