메뉴 건너뛰기




Volumn , Issue , 2007, Pages 4-12

Analyzing network traffic to detect self-decrypting exploit code

Author keywords

Decryption; Detection; Emulation; Exploit code; Polymorphic; Static analysis

Indexed keywords

CODES (SYMBOLS); COMPUTER SOFTWARE; CRYPTOGRAPHY; INTRUSION DETECTION; POLYMORPHISM; STATIC ANALYSIS;

EID: 34748920757     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1229285.1229291     Document Type: Conference Paper
Times cited : (43)

References (25)
  • 3
    • 34748873521 scopus 로고    scopus 로고
    • Intel Architecture Software Developers Manual. 2: Instruction Set Reference.
    • Intel Architecture Software Developers Manual. Volume 2: Instruction Set Reference.
  • 4
    • 34748886850 scopus 로고    scopus 로고
    • Metasploit project
    • Metasploit project, http://www.metasploit.org.
  • 10
    • 33745647290 scopus 로고    scopus 로고
    • R. Chinchani and E. Berg. A Fast Static Analysis Approach To Detect Exploit Code Inside Network Flows. In Proceedings of the 8 International Symposium on Recent Advances in Intrusion Detection (RAID'05), pages 284-308, September 2005.
    • R. Chinchani and E. Berg. A Fast Static Analysis Approach To Detect Exploit Code Inside Network Flows. In Proceedings of the 8 International Symposium on Recent Advances in Intrusion Detection (RAID'05), pages 284-308, September 2005.
  • 21
    • 34748823844 scopus 로고    scopus 로고
    • Countering Network Worms Through Automatic Patch Generation
    • S. Sidiroglou and A. Keromytis. Countering Network Worms Through Automatic Patch Generation. In Research Report, 2003.
    • (2003) Research Report
    • Sidiroglou, S.1    Keromytis, A.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.