메뉴 건너뛰기




Volumn 2, Issue 1, 2006, Pages 35-50

Malware pattern scanning schemes secure against black-box analysis

Author keywords

[No Author keywords available]

Indexed keywords


EID: 33748978409     PISSN: 17729890     EISSN: 17729904     Source Type: Journal    
DOI: 10.1007/s11416-006-0009-x     Document Type: Conference Paper
Times cited : (66)

References (26)
  • 1
    • 0000710299 scopus 로고
    • Queries and concept learning
    • Angluin, D.: Queries and concept learning. Mach. Learn. 2-4:319-342 (1988)
    • (1988) Mach. Learn. , vol.2-4 , pp. 319-342
    • Angluin, D.1
  • 3
    • 0003723775 scopus 로고    scopus 로고
    • Cambridge: Cambridge University Press, ISBN 0-5214-4432-2 and ISBN 0-5217-7231-1
    • Beth, T., Jungnickel, D., Lenz, H.: Design Theory, vol. 1. Cambridge: Cambridge University Press, ISBN 0-5214-4432-2 and ISBN 0-5217-7231-1 (1.999)
    • (1999) Design Theory , vol.1
    • Beth, T.1    Jungnickel, D.2    Lenz, H.3
  • 6
    • 84944068664 scopus 로고    scopus 로고
    • A new statistical testing for symmetric ciphers and hash functions
    • Proceedings of the 4th International Conference on Information and Communication Security 2002, Berlin Heidelberg New York: Springer
    • Filiol, E.: A new statistical testing for symmetric ciphers and hash functions. In: Proceedings of the 4th International Conference on Information and Communication Security 2002, Lecture Notes in Computer Science, vol. 2513, pp. 342-353. Berlin Heidelberg New York: Springer (2002)
    • (2002) Lecture Notes in Computer Science , vol.2513 , pp. 342-353
    • Filiol, E.1
  • 9
    • 33748967226 scopus 로고    scopus 로고
    • Fortinet, http://www.fortinet.com/FortiGuardCenter/global_threat_ stats.html
  • 12
    • 33746882464 scopus 로고    scopus 로고
    • Malware phylogeny generation using permutations of code
    • Karim, Md.E., Walenstein, A., Lakhotia, A.: Malware phylogeny generation using permutations of code. J. Comput. Virol. 1(1-2), pp. 13-23 (2005)
    • (2005) J. Comput. Virol. , vol.1 , Issue.1-2 , pp. 13-23
    • Karim, Md.E.1    Walenstein, A.2    Lakhotia, A.3
  • 15
    • 33845331515 scopus 로고
    • Minimization of Boolean functions
    • McCluskey, E.J.: Minimization of Boolean functions. Bell Syst. Tech. J. 35(5), 1417-1444 (1956)
    • (1956) Bell Syst. Tech. J. , vol.35 , Issue.5 , pp. 1417-1444
    • McCluskey, E.J.1
  • 17
    • 33748962046 scopus 로고    scopus 로고
    • Algebraic Structures
    • Rosen K.H. (ed.), CRC, Boca Raton, ISBN 0-8493-0149-1
    • Michaels, J.G.: Algebraic Structures. In: Rosen K.H. (ed.), Handbook of Discrete and Combinatorial Mathematics, pp. 344-354. CRC, Boca Raton, ISBN 0-8493-0149-1 (2000)
    • (2000) Handbook of Discrete and Combinatorial Mathematics , pp. 344-354
    • Michaels, J.G.1
  • 19
    • 0000070975 scopus 로고
    • The problem of symplifying truth functions
    • Quine, V.W.: The problem of symplifying truth functions. Am. Math. Monthly 59(8), 521-531 (1952)
    • (1952) Am. Math. Monthly , vol.59 , Issue.8 , pp. 521-531
    • Quine, V.W.1
  • 20
    • 0000316190 scopus 로고
    • A way to simplify truth functions
    • Quine, V.W.: A way to simplify truth functions. Am. Math. Monthly 62, 627-631 (1955)
    • (1955) Am. Math. Monthly , vol.62 , pp. 627-631
    • Quine, V.W.1
  • 21
    • 84856043672 scopus 로고
    • A mathematical theory of communication
    • Shannon, C.E.: A mathematical theory of communication. Bell Syst. Tech. J. 27, pp. 379-423, 623-656 (1948)
    • (1948) Bell Syst. Tech. J. , vol.27 , pp. 379-423
    • Shannon, C.E.1
  • 22
    • 3142720692 scopus 로고    scopus 로고
    • UK Department of Trade and Industry, A video presenting the report to the press as well as a summary for decision-makers are also available on this website (2004)
    • Stimms, S., Potter, C., Beard, A.: 2004 information security breaches survey, UK Department of Trade and Industry, 2004. Available at http://www.security-survey.gov.uk. A video presenting the report to the press as well as a summary for decision-makers are also available on this website (2004)
    • (2004) 2004 Information Security Breaches Survey
    • Stimms, S.1    Potter, C.2    Beard, A.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.