메뉴 건너뛰기




Volumn 5, Issue 2, 2007, Pages 32-39

Toward automated dynamic malware analysis using CWSandbox

Author keywords

[No Author keywords available]

Indexed keywords

CODES (SYMBOLS); COMPUTER SIMULATION; SOFTWARE ENGINEERING; SUPERVISORY AND EXECUTIVE PROGRAMS;

EID: 34047110218     PISSN: 15407993     EISSN: None     Source Type: Journal    
DOI: 10.1109/MSP.2007.45     Document Type: Review
Times cited : (624)

References (3)
  • 1
    • 34047172962 scopus 로고    scopus 로고
    • API Hooking Revealed
    • I. Ivanov, "API Hooking Revealed," The Code Project, 2002; www.codeproject.com/system/hooksys.asp.
    • (2002) The Code Project
    • Ivanov, I.1
  • 2
    • 34047153756 scopus 로고    scopus 로고
    • Hooking Windows API - Technics of Hooking API Functions on Windows
    • Holy Father, "Hooking Windows API - Technics of Hooking API Functions on Windows," CodeBreakers J., vol. 1, no. 2, 2004; www.secure-software-engineering.com/index.php?option=com_content&task= view&id=54&Itemid=27.
    • (2004) CodeBreakers J , vol.1 , Issue.2
    • Father, H.1
  • 3
    • 33750376598 scopus 로고    scopus 로고
    • The Nepenthes Platform: An Efficient Approach to Collect Malware
    • Prof. 9th Int'l Symp. Recent Advances in Intrusion Detection RAID 06, Springer-Verlag
    • P. Baecher et al., "The Nepenthes Platform: An Efficient Approach to Collect Malware," Prof. 9th Int'l Symp. Recent Advances in Intrusion Detection (RAID 06), LNCS 4219, Springer-Verlag, 2006, pp. 165-184.
    • (2006) LNCS , vol.4219 , pp. 165-184
    • Baecher, P.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.