메뉴 건너뛰기




Volumn , Issue , 2004, Pages 34-44

Testing malware detectors

Author keywords

Adaptive testing; Anti virus; Malware; Obfuscation

Indexed keywords

ADAPTIVE ALGORITHMS; COMPUTER SOFTWARE SELECTION AND EVALUATION; ENCAPSULATION; ERROR DETECTION; FLOPPY DISK STORAGE; PROGRAM COMPILERS; SCANNING;

EID: 23744485744     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1007512.1007518     Document Type: Conference Paper
Times cited : (224)

References (43)
  • 1
    • 0023453626 scopus 로고
    • Learning regular sets from queries and counterexamples
    • D. Angluin. Learning regular sets from queries and counterexamples. Information and Computation, 75:87-106, 1987.
    • (1987) Information and Computation , vol.75 , pp. 87-106
    • Angluin, D.1
  • 2
    • 33644579869 scopus 로고    scopus 로고
    • Virus Test Center, University of Hamburg, Computer Science Department, Mar. Last accessed: 16 Jan. 2004
    • K. Brunnstein. "Heureka-2" AntiVirus Tests. Virus Test Center, University of Hamburg, Computer Science Department, Mar. 2002. Published online at http://agn-www.informatik.uni-hamburg.de/vtc/en0203.htm. Last accessed: 16 Jan. 2004.
    • (2002) "Heureka-2" AntiVirus Tests
    • Brunnstein, K.1
  • 3
    • 0028751768 scopus 로고
    • On the relationship between partition and random testing
    • Dec.
    • T. Chen and Y. Yu. On the relationship between partition and random testing. IEEE Transactions on Software Engineering, 20(12):977-980, Dec. 1994.
    • (1994) IEEE Transactions on Software Engineering , vol.20 , Issue.12 , pp. 977-980
    • Chen, T.1    Yu, Y.2
  • 4
    • 84947229190 scopus 로고    scopus 로고
    • An approach to the obfuscation of control-flow of sequential computer programs
    • G. Davida and Y. Frankel, editors, Proceedings of the 4th International Information Security Conference (ISC'01), Malaga, Spain, Oct. Springer-Verlag
    • S. Chow, Y. Gu, H. Johnson, and V. Zakharov. An approach to the obfuscation of control-flow of sequential computer programs. In G. Davida and Y. Frankel, editors, Proceedings of the 4th International Information Security Conference (ISC'01), volume 2200 of Lecture Notes in Computer Science, pages 144-155, Malaga, Spain, Oct. 2001. Springer-Verlag.
    • (2001) Lecture Notes in Computer Science , vol.2200 , pp. 144-155
    • Chow, S.1    Gu, Y.2    Johnson, H.3    Zakharov, V.4
  • 5
    • 0004046658 scopus 로고    scopus 로고
    • A taxonomy of obfuscating transformations
    • Department of Computer Science, University of Auckland, New Zealand, July
    • C. Collberg, C. Thomborson, and D. Low. A taxonomy of obfuscating transformations. Technical Report 148, Department of Computer Science, University of Auckland, New Zealand, July 1997.
    • (1997) Technical Report , vol.148
    • Collberg, C.1    Thomborson, C.2    Low, D.3
  • 9
    • 33644565261 scopus 로고    scopus 로고
    • Polymorphic shellcode engine using spectrum analysis
    • Aug. Last accessed: 16 Jan. 2004
    • T. Detristan, T. Ulenspiegel, Y. Malcom, and M. S. von Underduk. Polymorphic shellcode engine using spectrum analysis. Phrack, 11(61), Aug. 2003. Published online at http://www.phrack.org. Last accessed: 16 Jan. 2004.
    • (2003) Phrack , vol.11 , Issue.61
    • Detristan, T.1    Ulenspiegel, T.2    Malcom, Y.3    Von Underduk, M.S.4
  • 11
    • 4444381692 scopus 로고    scopus 로고
    • An empirical study of the robustness of Windows NT applications using random testing
    • Seattle, WA, USA, Aug.
    • J. E. Forrester and B. P. Miller. An empirical study of the robustness of Windows NT applications using random testing. In Proceedings of the 4th USENIX Windows Systems Symposium, pages 59-68, Seattle, WA, USA, Aug. 2000.
    • (2000) Proceedings of the 4th USENIX Windows Systems Symposium , pp. 59-68
    • Forrester, J.E.1    Miller, B.P.2
  • 13
    • 33644578864 scopus 로고    scopus 로고
    • Real world anti-virus product reviews and evaluations - The current state of affairs
    • Baltimore, MD, USA, Oct. National Institute of Standards and Technology (NIST)
    • S. Gordon and R. Ford. Real world anti-virus product reviews and evaluations - the current state of affairs. In Proceedings of the 19th National Information Systems Security Conference (NISSC'96), pages 526-538, Baltimore, MD, USA, Oct. 1996. National Institute of Standards and Technology (NIST).
    • (1996) Proceedings of the 19th National Information Systems Security Conference (NISSC'96) , pp. 526-538
    • Gordon, S.1    Ford, R.2
  • 14
    • 0025530786 scopus 로고
    • Partition testing does not inspire confidence
    • Dec.
    • D. Hamlet and R. Taylor. Partition testing does not inspire confidence. IEEE Transactions on Software Engineering, 16(12):1402-1441, Dec. 1990.
    • (1990) IEEE Transactions on Software Engineering , vol.16 , Issue.12 , pp. 1402-1441
    • Hamlet, D.1    Taylor, R.2
  • 17
    • 33644581040 scopus 로고    scopus 로고
    • Last accessed: 16 Jan. 2004
    • ICSA Labs. Anti-virus product certification. Published online at http://www.icsalabs.com/html/communities/antivirus/certification.shtml. Last accessed: 16 Jan. 2004.
    • Anti-virus Product Certification
  • 18
    • 33644569366 scopus 로고    scopus 로고
    • chapter Ways of Infection: Viruses without an Entry Point. Kaspersky Labs
    • E. Kaspersky. Virus List Encyclopedia, chapter Ways of Infection: Viruses without an Entry Point. Kaspersky Labs, 2002.
    • (2002) Virus List Encyclopedia
    • Kaspersky, E.1
  • 19
    • 23744477043 scopus 로고    scopus 로고
    • Sobig.a and the spam you received today
    • LURHQ, Last accessed on 16 Jan. 2004
    • LURHQ Threat Intelligence Group. Sobig.a and the spam you received today. Technical report, LURHQ, 2003. Published online at http://www.lurhq.com/sobig.html. Last accessed on 16 Jan. 2004.
    • (2003) Technical Report
  • 20
    • 23744454494 scopus 로고    scopus 로고
    • Sobig.e - Evolution of the worm
    • LURHQ, Last accessed on 16 Jan. 2004
    • LURHQ Threat Intelligence Group. Sobig.e - Evolution of the worm. Technical report, LURHQ, 2003. Published online at http://www.lurhq.com/sobig-e.html. Last accessed on 16 Jan. 2004.
    • (2003) Technical Report
  • 21
    • 23744446909 scopus 로고    scopus 로고
    • Sobig.f examined
    • LURHQ, Last accessed on 16 Jan. 2004
    • LURHQ Threat Intelligence Group. Sobig.f examined. Technical report, LURHQ, 2003. Published online at http://www.lurhq.com/sobig-f.html. Last accessed on 16 Jan. 2004.
    • (2003) Technical Report
  • 22
    • 23744514456 scopus 로고    scopus 로고
    • Russian doll
    • Aug.
    • A. Marinescu. Russian doll. Virus Bulletin, pages 7-9, Aug. 2003.
    • (2003) Virus Bulletin , pp. 7-9
    • Marinescu, A.1
  • 24
    • 33644567531 scopus 로고    scopus 로고
    • Retrospective testing - How good heuristics really work
    • New Orleans, LA, USA, Sept. Virus Bulletin
    • A. Marx. Retrospective testing - how good heuristics really work. In Proceedings of the 2002 Virus Bulletin Conference (VB2002), New Orleans, LA, USA, Sept. 2002. Virus Bulletin.
    • (2002) Proceedings of the 2002 Virus Bulletin Conference (VB2002)
    • Marx, A.1
  • 25
    • 33644566538 scopus 로고    scopus 로고
    • Last accessed: 16 Jan. 2004
    • McAfee AVERT. Virus information library. Published online at http://us.mcafee.com/virusInfo/default.asp. Last accessed: 16 Jan. 2004.
    • Virus Information Library
  • 26
    • 0034269416 scopus 로고    scopus 로고
    • Attacking malicious code: Report to the Infosec research council
    • Sept./Oct.
    • G. McGraw and G. Morrisett. Attacking malicious code: report to the Infosec research council. IEEE Software, 17(5):33-41, Sept./Oct. 2000.
    • (2000) IEEE Software , vol.17 , Issue.5 , pp. 33-41
    • McGraw, G.1    Morrisett, G.2
  • 27
    • 0025557712 scopus 로고
    • An empirical study of the reliability of UNIX utilities
    • Dec.
    • B. P. Miller, L. Fredriksen, and B. So. An empirical study of the reliability of UNIX utilities. Communications of the ACM, 33(12):12-44, Dec. 1990.
    • (1990) Communications of the ACM , vol.33 , Issue.12 , pp. 12-44
    • Miller, B.P.1    Fredriksen, L.2    So, B.3
  • 28
    • 0003577356 scopus 로고
    • Fuzz revisited: A re-examination of the reliability of UNIX utilities and services
    • University of Wisconsin, Madison, Computer Sciences Department, Madison, WI, USA, Apr.
    • B. P. Miller, D. Koski, C. P. Lee, V. Maganty, R. Murthy, A. Natarajan, and J. Steidl. Fuzz revisited: A re-examination of the reliability of UNIX utilities and services. Technical Report 1268, University of Wisconsin, Madison, Computer Sciences Department, Madison, WI, USA, Apr. 1995.
    • (1995) Technical Report , vol.1268
    • Miller, B.P.1    Koski, D.2    Lee, C.P.3    Maganty, V.4    Murthy, R.5    Natarajan, A.6    Steidl, J.7
  • 31
    • 0035481250 scopus 로고    scopus 로고
    • On comparisons of random, partition, and proportional partition testing
    • Oct.
    • S. C. Ntafos. On comparisons of random, partition, and proportional partition testing. IEEE Transactions on Software Engineering, 27(10):949-960, Oct. 2001.
    • (2001) IEEE Transactions on Software Engineering , vol.27 , Issue.10 , pp. 949-960
    • Ntafos, S.C.1
  • 32
    • 57149147896 scopus 로고    scopus 로고
    • Last accessed: 16 Jan. 2004
    • Symantec Antivirus Research Center. Expanded threat list and virus encyclopedia. Published online at http://securityresponse.symantec.com/avcenter/venc/data/cih.html. Last accessed: 16 Jan. 2004.
    • Expanded Threat List and Virus Encyclopedia
  • 34
    • 33644577975 scopus 로고    scopus 로고
    • Last accessed: 15 Jan. 2004
    • TESO. Burneye ELF encryption program. Published online at http://teso.scene.at. Last accessed: 15 Jan. 2004.
    • Burneye ELF Encryption Program
  • 35
    • 78149235437 scopus 로고    scopus 로고
    • Last accessed: 16 Jan. 2004
    • The WildList Organization International. Frequently asked questions. Published online at http://www.wildlist.org/faq.htm. Last accessed: 16 Jan. 2004.
    • Frequently Asked Questions
  • 36
    • 33644563190 scopus 로고    scopus 로고
    • Last accessed: 16 Jan. 2004
    • Virus Bulletin. VB 100% Award. Published online at http://www.virusbtn.com/vb100/about/100use.xml. Last accessed: 16 Jan. 2004.
    • Virus Bulletin. VB 100% Award
  • 38
    • 33644564213 scopus 로고    scopus 로고
    • Last accessed: 16 Jan. 2004
    • West Coast Labs. Anti-virus Checkmark level 2. Published online at http://www.check-mark.com/checkmark/pdf/Checkmark_AV1.pdf. Last accessed: 16 Jan. 2004.
    • Anti-virus Checkmark Level 2
  • 39
    • 33644564213 scopus 로고    scopus 로고
    • Last accessed: 16 Jan. 2004
    • West Coast Labs. Anti-virus Checkmark level 2. Published online at http://www.check-mark.com/checkmark/pdf/Checkmark_AV2.pdf. Last accessed: 16 Jan. 2004.
    • Anti-virus Checkmark Level 2
  • 41
    • 11144229255 scopus 로고    scopus 로고
    • PhD thesis, Institute of Engineering Cybernetics, Wroclaw University of Technology, Wroclaw, Poland
    • G. Wroblewski. General method of program code obfuscation. PhD thesis, Institute of Engineering Cybernetics, Wroclaw University of Technology, Wroclaw, Poland, 2002.
    • (2002) General Method of Program Code Obfuscation
    • Wroblewski, G.1
  • 43
    • 84861266854 scopus 로고    scopus 로고
    • Last accessed: 16 Jan. 2004
    • z0mbie. z0mbie's homepage. Published online at http://z0mbie.host.sk. Last accessed: 16 Jan. 2004.
    • Z0mbie's Homepage


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.