메뉴 건너뛰기




Volumn 5, Issue 2, 2007, Pages 40-45

Using entropy analysis to find encrypted and packed malware

Author keywords

[No Author keywords available]

Indexed keywords

BINARY FILE BYTES; BINTROPY; MALWARE COLLECTIONS; PACKED MALWARE;

EID: 34047129159     PISSN: 15407993     EISSN: None     Source Type: Journal    
DOI: 10.1109/MSP.2007.48     Document Type: Review
Times cited : (310)

References (5)
  • 1
    • 84888875986 scopus 로고    scopus 로고
    • Runtime Packers: The Hidden Problem
    • Black Hat
    • T. Brosch and M. Morgenstern, "Runtime Packers: The Hidden Problem," Proc. Black Hat USA, Black Hat, 2006; www.blackhat.com/ presentations/bh-usa-06/BH-US-06-Morgenstern.pdf.
    • (2006) Proc. Black Hat USA
    • Brosch, T.1    Morgenstern, M.2
  • 4
    • 33748981532 scopus 로고    scopus 로고
    • An Introduction to Randomness and Random Numbers
    • Random.org, June
    • M. Haahr, "An Introduction to Randomness and Random Numbers," Random.org, June 1999; www.random.org/essay.html.
    • (1999)
    • Haahr, M.1
  • 5
    • 34047149265 scopus 로고    scopus 로고
    • A. Stephan, Improving Proactive Detection of Packed Malware, Virus Bulletin, 01 Mar. 2006; www.virusbtn.com/virusbulletin/archive/ 2006/03/vb200603-packed.
    • A. Stephan, "Improving Proactive Detection of Packed Malware," Virus Bulletin, 01 Mar. 2006; www.virusbtn.com/virusbulletin/archive/ 2006/03/vb200603-packed.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.