메뉴 건너뛰기




Volumn 2, Issue 1, 2006, Pages 67-77

Dynamic analysis of malicious code

Author keywords

Analysis; API; Dynamic analysis; Malware; Static analysis; Virus worm

Indexed keywords


EID: 33748932391     PISSN: 17729890     EISSN: 17729904     Source Type: Journal    
DOI: 10.1007/s11416-006-0012-2     Document Type: Conference Paper
Times cited : (249)

References (26)
  • 2
    • 84924223669 scopus 로고    scopus 로고
    • Static analysis of executables to detect malicious patterns
    • Christodorcscu, M., Jha, S.: Static analysis of executables to detect malicious patterns. In: Usenix Security Symposium, 2003
    • (2003) Usenix Security Symposium
    • Christodorcscu, M.1    Jha, S.2
  • 7
    • 33748930194 scopus 로고    scopus 로고
    • Kaspersky Lab: antivirus software, 2006. http://www. kaspersky.com/
    • (2006) Antivirus Software
  • 11
    • 33748941543 scopus 로고    scopus 로고
    • Microsoft IFS KIT, 2006. http://www.microsoft.com/whdc/ devtools/ifskit
    • (2006) Microsoft IFS KIT
  • 13
    • 33748927924 scopus 로고    scopus 로고
    • Microsoft Platform SDK, 2006. http://www.microsoft.com/ msdownload/platfurmsdk/
    • (2006)
  • 17
    • 4444223876 scopus 로고    scopus 로고
    • Analysis of the Intel Pentium's ability to supporta secure virtual machine monitor
    • Robin, J., Irvine, C.: Analysis of the Intel Pentium's ability to supporta secure virtual machine monitor. In: Usenix Annual Technical Conference. 2000
    • (2000) Usenix Annual Technical Conference
    • Robin, J.1    Irvine, C.2
  • 21
    • 33748943115 scopus 로고    scopus 로고
    • Symantec. Internet security threat report. 2005. http://www. symantec.com/enterprise/threatreport/index.jsp
    • (2005) Internet Security Threat Report


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.