메뉴 건너뛰기




Volumn 2006, Issue , 2006, Pages 15-29

Cobra: Fine-grained malware analysis using stealth localized-executions

Author keywords

[No Author keywords available]

Indexed keywords

CRYPTOGRAPHY; DATA FLOW ANALYSIS; INFORMATION ANALYSIS; USER INTERFACES;

EID: 33751025643     PISSN: 10816011     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SP.2006.9     Document Type: Conference Paper
Times cited : (78)

References (56)
  • 6
    • 0030092390 scopus 로고    scopus 로고
    • Checking for race conditions in file accesses
    • M. Bishop and M. Dilger. Checking for race conditions in file accesses. Computing Systems, 9(2), 1996.
    • (1996) Computing Systems , vol.9 , Issue.2
    • Bishop, M.1    Dilger, M.2
  • 15
    • 27544477843 scopus 로고    scopus 로고
    • Netsky: A conflict starter?
    • May
    • M. Ciubotariu. Netsky: a conflict starter? Virus Bulletin, pages 4-8, May 2004.
    • (2004) Virus Bulletin , pp. 4-8
    • Ciubotariu, M.1
  • 16
    • 0023294949 scopus 로고
    • Computer viruses: Theory and experiments
    • F. Cohen. Computer viruses: Theory and experiments. Computers and Security, 6:22-35, 1987.
    • (1987) Computers and Security , vol.6 , pp. 22-35
    • Cohen, F.1
  • 18
    • 0036704573 scopus 로고    scopus 로고
    • Watermarking, tamperproofing, and obfuscation - Tools for software protection
    • August
    • C. Collberg and C. Thomborson. Watermarking, tamperproofing, and obfuscation - tools for software protection. IEEE Transactions on Software Engineering, 28(8):735-746, August 2002.
    • (2002) IEEE Transactions on Software Engineering , vol.28 , Issue.8 , pp. 735-746
    • Collberg, C.1    Thomborson, C.2
  • 20
    • 33751022720 scopus 로고    scopus 로고
    • Compuware Corporation. Technical Paper, September
    • Compuware Corporation. Debugging blue screens. Technical Paper, September 1999.
    • (1999) Debugging Blue Screens
  • 24
    • 84861256922 scopus 로고    scopus 로고
    • Lessons from virus developers: The beagle worm history through april 24, 2004
    • May Last accessed 01 November 2005
    • J. Gordon. Lessons from virus developers: The beagle worm history through april 24, 2004. Security Focus, May 2004. Available online at URL http://downloads.securityfocus.com/library/BeagleLessons.pdf. Last accessed 01 November 2005.
    • (2004) Security Focus
    • Gordon, J.1
  • 25
    • 33751030728 scopus 로고    scopus 로고
    • Ia-32 intel architecture software developers manual
    • Intel Corp.
    • Intel Corp. Ia-32 intel architecture software developers manual, vols 1-3. Intel Developers Guide, 2003.
    • (2003) Intel Developers Guide , vol.1-3
  • 32
  • 35
    • 23744454494 scopus 로고    scopus 로고
    • Sobig.e - Evolution of the worm
    • Last accessed 01 November 2005
    • LURHQ. Sobig.e - evolution of the worm. Technical Report. LURHQ, 2003. Available online at URL http://www.lurhq.com/sobig-e.html. Last accessed 01 November 2005.
    • (2003) Technical Report. LURHQ
  • 37
    • 33751061397 scopus 로고    scopus 로고
    • McAfee. W32/hiv. October. Last accessed 28 Oct. 2005
    • McAfee. W32/hiv. Virus Information Library, October 2000. Available online at URL http://vil-origin.nai.com/vil/. Last accessed 28 Oct. 2005.
    • (2000) Virus Information Library
  • 38
    • 33751051932 scopus 로고    scopus 로고
    • McAfee. W32/mydoom@mm. Last accessed 28 Oct. 2005
    • McAfee. W32/mydoom@mm. Virus Information Library, 2004. Available online at URL http://vil-origin.nai.com/vil/. Last accessed 28 Oct. 2005.
    • (2004) Virus Information Library
  • 39
    • 0034269416 scopus 로고    scopus 로고
    • Attacking malicious code: Report to the infosec research council
    • October
    • G. McGraw and G. Morrisett. Attacking malicious code: Report to the infosec research council. IEEE Software, 17(5):33-41, October 2000.
    • (2000) IEEE Software , vol.17 , Issue.5 , pp. 33-41
    • McGraw, G.1    Morrisett, G.2
  • 43
    • 33751066337 scopus 로고    scopus 로고
    • Debugging windows based applications using windbg
    • J. Robbins. Debugging windows based applications using windbg. Miscrosoft Systems Journal, 1999.
    • (1999) Miscrosoft Systems Journal
    • Robbins, J.1
  • 45
    • 0013135152 scopus 로고    scopus 로고
    • Analysis and detection of computer viruses and worms: An annotated bibliography
    • February
    • P. Singh and A. Lakhotia. Analysis and detection of computer viruses and worms: An annotated bibliography. ACM SIGPLAN Notices, 37(2):29-35, February 2002.
    • (2002) ACM SIGPLAN Notices , vol.37 , Issue.2 , pp. 29-35
    • Singh, P.1    Lakhotia, A.2
  • 47
    • 33751037764 scopus 로고    scopus 로고
    • Last Accessed: 28 October 2005
    • Symantec. Understanding and managing polymorphic viruses. Available online at URL http://www.symantec.com/avcenter/whitepapers.html. Last Accessed: 28 October 2005.
    • Understanding and Managing Polymorphic Viruses
  • 49
    • 33751025054 scopus 로고    scopus 로고
    • Bkdr.surila.g (w32/ratos)
    • August. Last accessed 28 Oct. 2005
    • TrendMicro. Bkdr.surila.g (w32/ratos). Virus Encyclopedia, August 2004. Available online at URL http://www.trendmicro.com/vinfo/virusencyclo/. Last accessed 28 Oct. 2005.
    • (2004) Virus Encyclopedia
  • 52
    • 33751025884 scopus 로고    scopus 로고
    • Accelerate software development, testing and deployment with the vmware virtualization platform
    • VMWare Inc. June
    • VMWare Inc. Accelerate software development, testing and deployment with the vmware virtualization platform. Technical Report, VMWare Technology Network, June 2005.
    • (2005) Technical Report, VMWare Technology Network
  • 56
    • 33751064002 scopus 로고    scopus 로고
    • Polymorphic viruses, implementation, detection and protection
    • Last accessed 28 Oct. 2005
    • T. Yetiser. Polymorphic viruses, implementation, detection and protection. VDS Advanced Research Group, P.O. Box 9393, Baltimore, MD 21228, USA. Available online at URL http://vx.netlux.org/lib/ayt01.html. Last accessed 28 Oct. 2005.
    • VDS Advanced Research Group, P.O. Box 9393, Baltimore, MD 21228, USA
    • Yetiser, T.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.