메뉴 건너뛰기




Volumn 5, Issue 2, 2007, Pages 46-54

Code normalization for self-mutating malware

Author keywords

[No Author keywords available]

Indexed keywords

CODE NORMALIZATION; MALWARE SIGNATURES; SELF-MUTATING CODES; SELF-MUTATING MALWARE;

EID: 34047180006     PISSN: 15407993     EISSN: None     Source Type: Journal    
DOI: 10.1109/MSP.2007.31     Document Type: Review
Times cited : (60)

References (18)
  • 1
    • 34047173968 scopus 로고    scopus 로고
    • P. Ször and P. Ferrie, Hunting for Metamorphic, Proc. Virus Bulletin Conf., Virus Bulletin, 2001, pp. 123-144.
    • P. Ször and P. Ferrie, "Hunting for Metamorphic," Proc. Virus Bulletin Conf., Virus Bulletin, 2001, pp. 123-144.
  • 3
    • 84924223669 scopus 로고    scopus 로고
    • Static Analysis of Executables to Detect Malicious Patterns
    • Usenix Assoc
    • M. Christodorescu and S. Jha, "Static Analysis of Executables to Detect Malicious Patterns," Proc. Usenix Security Symposium, Usenix Assoc., 2003, pp. 169-186.
    • (2003) Proc. Usenix Security Symposium , pp. 169-186
    • Christodorescu, M.1    Jha, S.2
  • 4
    • 34047097266 scopus 로고    scopus 로고
    • D.M. Chess and S.P. White, An Undetectable Computer Virus, Proc. Virus Bulletin Conf., Virus Bulletin, 2000; www.research.ibm.com/ antivirus/SciPapers/VB2000DC.htm.
    • D.M. Chess and S.P. White, "An Undetectable Computer Virus," Proc. Virus Bulletin Conf., Virus Bulletin, 2000; www.research.ibm.com/ antivirus/SciPapers/VB2000DC.htm.
  • 6
    • 0004046658 scopus 로고    scopus 로고
    • A Taxonomy of Obfuscating Transformations
    • Dept. of Computer Science, Univ. of Auckland, July
    • C. Collberg, C. Thomborson, and D Low, A Taxonomy of Obfuscating Transformations, tech. report 148, Dept. of Computer Science, Univ. of Auckland, July 1997.
    • (1997) tech. report , vol.148
    • Collberg, C.1    Thomborson, C.2    Low, D.3
  • 8
    • 34047145867 scopus 로고    scopus 로고
    • Are Metamorphic Viruses Really Invincible?
    • Dec
    • A. Lakhotia, A. Kapoor, and E.U. Kumar, "Are Metamorphic Viruses Really Invincible?" Virus Bulletin, Dec. 2004, pp. 5-7.
    • (2004) Virus Bulletin , pp. 5-7
    • Lakhotia, A.1    Kapoor, A.2    Kumar, E.U.3
  • 9
    • 0000162467 scopus 로고    scopus 로고
    • Compiler Techniques for Code Compaction
    • S.K. Debray et al., "Compiler Techniques for Code Compaction," ACM Trans. Programming Languages and Systems, vol. 22, no. 2, 2000, pp. 378-415.
    • (2000) ACM Trans. Programming Languages and Systems , vol.22 , Issue.2 , pp. 378-415
    • Debray, S.K.1
  • 11
    • 33846012075 scopus 로고
    • A.V Aho, R. Sethi, and J.D Ullman, Compilers:, Addison-Wesley
    • A.V Aho, R. Sethi, and J.D Ullman, Compilers: Principles, Techniques and Tools, Addison-Wesley, 1986.
    • (1986) Principles, Techniques and Tools
  • 12
    • 0016870630 scopus 로고
    • An Algorithm for Subgraph Isomorphism
    • J.R. Ullman, "An Algorithm for Subgraph Isomorphism," J. ACM, vol. 23, no. 1, 1976, pp. 31-42.
    • (1976) J. ACM , vol.23 , Issue.1 , pp. 31-42
    • Ullman, J.R.1
  • 13
    • 33746389292 scopus 로고    scopus 로고
    • Polymorphic Worm Detection using Structural Information of Executables
    • Springer
    • C. Kruegel et al., "Polymorphic Worm Detection using Structural Information of Executables," Proc. Int'l Symp. Recent Advances in Intrusion Detcaion, Springer, 2005, pp. 207-226.
    • (2005) Proc. Int'l Symp. Recent Advances in Intrusion Detcaion , pp. 207-226
    • Kruegel, C.1
  • 17
    • 4644303571 scopus 로고    scopus 로고
    • A (Sub)graph Isomorphism Algorithm for Matching Large Graphs
    • L.P. Cordella et al., "A (Sub)graph Isomorphism Algorithm for Matching Large Graphs," IEEE Trans. Pattern Analysis and Machine Intelligence, vol. 26, no. 10, 2004, pp. 1367-1372.
    • (2004) IEEE Trans. Pattern Analysis and Machine Intelligence , vol.26 , Issue.10 , pp. 1367-1372
    • Cordella, L.P.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.