메뉴 건너뛰기




Volumn , Issue , 2007, Pages 231-245

Exploring multiple execution paths for malware analysis

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER OPERATING SYSTEMS; COMPUTER WORMS; DATA REDUCTION; DYNAMIC ANALYSIS; SUPERVISORY AND EXECUTIVE PROGRAMS;

EID: 34548737161     PISSN: 10816011     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SP.2007.17     Document Type: Conference Paper
Times cited : (413)

References (30)
  • 5
    • 34548772699 scopus 로고    scopus 로고
    • Towards Automatically Identifying Trigger-based Behavior in Malware using Symbolic Execution and Binary Analysis
    • Technical Report CMU-CS-07-105, Carnegie Mellon University
    • D. Brumley, C. Hartwig, Z. Liang, J. Newsome, D. Song, and H. Yin. Towards Automatically Identifying Trigger-based Behavior in Malware using Symbolic Execution and Binary Analysis. Technical Report CMU-CS-07-105, Carnegie Mellon University, 2007.
    • (2007)
    • Brumley, D.1    Hartwig, C.2    Liang, Z.3    Newsome, J.4    Song, D.5    Yin, H.6
  • 8
    • 84924223669 scopus 로고    scopus 로고
    • Static Analysis of Executables to Detect Malicious Patterns
    • M. Christodorescu and S. Jha. Static Analysis of Executables to Detect Malicious Patterns. In Usenix Security Symposium, 2003.
    • (2003) Usenix Security Symposium
    • Christodorescu, M.1    Jha, S.2
  • 11
    • 84885679117 scopus 로고    scopus 로고
    • M. Costa, J. Crowcroft, M. Castro, A. Rowstron, L. Zhou, L. Zhang, and P. Barham. Vigilante: End-to-End Containment of Internet Worms. In 20th ACM Symposium on Operating Systems Principles (SOSP), 2005.
    • M. Costa, J. Crowcroft, M. Castro, A. Rowstron, L. Zhou, L. Zhang, and P. Barham. Vigilante: End-to-End Containment of Internet Worms. In 20th ACM Symposium on Operating Systems Principles (SOSP), 2005.
  • 12
    • 33750355107 scopus 로고    scopus 로고
    • Minos: Architectural support for software security through control data integrity
    • J. Crandall and F. Chong. Minos: Architectural support for software security through control data integrity. In International Symposium on Microarchitecture, 2004.
    • (2004) International Symposium on Microarchitecture
    • Crandall, J.1    Chong, F.2
  • 18
    • 18944390941 scopus 로고    scopus 로고
    • The model checker spin
    • G. Holzmann. The model checker spin. Software Engineering, 23(5), 1997.
    • (1997) Software Engineering , vol.23 , Issue.5
    • Holzmann, G.1
  • 19
    • 0016971687 scopus 로고
    • Symbolic Execution and Program Testing
    • J. King. Symbolic Execution and Program Testing. Communications of the ACM, 1976.
    • (1976) Communications of the ACM
    • King, J.1
  • 23
    • 79953672829 scopus 로고    scopus 로고
    • Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software
    • J. Newsome and D. Song. Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software. In 12th Annual Network and Distributed System Security Symposium (NDSS), 2005.
    • (2005) 12th Annual Network and Distributed System Security Symposium (NDSS)
    • Newsome, J.1    Song, D.2
  • 24
    • 84885629677 scopus 로고    scopus 로고
    • E. Nightingale, P. Chen, and J. Flinn. Speculative Execution in a Distributed File System. In 20th Symposium on Operating Systems Principles (SOSP), 2005.
    • E. Nightingale, P. Chen, and J. Flinn. Speculative Execution in a Distributed File System. In 20th Symposium on Operating Systems Principles (SOSP), 2005.
  • 30
    • 34547476456 scopus 로고    scopus 로고
    • Method of Program Code Obfuscation. PhD thesis, Wroclaw University of Technology
    • G. Wroblewski. General Method of Program Code Obfuscation. PhD thesis, Wroclaw University of Technology, 2002.
    • (2002) General
    • Wroblewski, G.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.