메뉴 건너뛰기




Volumn 4579 LNCS, Issue , 2007, Pages 231-250

A study of malcode-bearing documents

Author keywords

Intrusion detection; N gram; Sandbox diversity

Indexed keywords

CODES (SYMBOLS); COMPUTATIONAL COMPLEXITY; COMPUTER CRIME; INTRUSION DETECTION; PROBLEM SOLVING;

EID: 38049030703     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-73614-1_14     Document Type: Conference Paper
Times cited : (48)

References (35)
  • 4
    • 38049076951 scopus 로고    scopus 로고
    • Wikipedia hijacked by malware
    • November
    • Broersma, M.: Wikipedia hijacked by malware. Techworld (November 2006) http://www.techworld.com/news/index.cfm?RSS&NewsID=7254
    • (2006) Techworld
    • Broersma, M.1
  • 5
    • 0347104967 scopus 로고
    • Possible Virus Attacks Against Integrity Programs and How to Prevent Them
    • Proc. 2nd Int
    • Bontchev, V.: Possible Virus Attacks Against Integrity Programs and How to Prevent Them. In: Proc. 2nd Int. Virus Bull. Conf. pp. 131-141 (1992)
    • (1992) Virus Bull. Conf. pp , vol.131-141
    • Bontchev, V.1
  • 6
    • 38049082165 scopus 로고    scopus 로고
    • Macro Virus Identification Problems
    • Proc. 7th Int
    • Bontchev, V.: Macro Virus Identification Problems. In: Proc. 7th Int. Virus Bull. Conf. pp. 175-196 (1997)
    • (1997) Virus Bull. Conf. pp , vol.175-196
    • Bontchev, V.1
  • 8
    • 33750335757 scopus 로고    scopus 로고
    • Wang, K., Parekh, J., Stolfo, S.J.: Anagram: A Content Anomaly Detector Resistant to Mimicry Attack. In: Zamboni, D., Kruegel, C. (eds.) RAID 2006. LNCS, 4219, Springer, Heidelberg (2006)
    • Wang, K., Parekh, J., Stolfo, S.J.: Anagram: A Content Anomaly Detector Resistant to Mimicry Attack. In: Zamboni, D., Kruegel, C. (eds.) RAID 2006. LNCS, vol. 4219, Springer, Heidelberg (2006)
  • 10
    • 38049083984 scopus 로고    scopus 로고
    • Stolfo, S.J., Wang, K., Li, W.-J.: Towards Stealthy Malware Detection. In: Jha, Christodorescu, Wang (eds.) Malware Detection Book, Springer, Heidelberg (2006)
    • Stolfo, S.J., Wang, K., Li, W.-J.: Towards Stealthy Malware Detection. In: Jha, Christodorescu, Wang (eds.) Malware Detection Book, Springer, Heidelberg (2006)
  • 13
    • 18844362133 scopus 로고    scopus 로고
    • Abou-Assaleh, T, Cercone, N, Keselj, V, Sweidan, R, N-gram-based Detection of New Malicious Code. In: Proceedings of the 28th IEEE Annual International Computer Software and Applications Conference, COMPSAC 2004. Hong Kong. September 28-30,2004 2004
    • Abou-Assaleh, T., Cercone, N., Keselj, V., Sweidan, R.: N-gram-based Detection of New Malicious Code. In: Proceedings of the 28th IEEE Annual International Computer Software and Applications Conference, COMPSAC 2004. Hong Kong. September 28-30,2004 (2004)
  • 16
    • 38049053108 scopus 로고    scopus 로고
    • Noga, A.J.: A Visual Data Hash Method. Air Force Research report (October 2004)
    • Noga, A.J.: A Visual Data Hash Method. Air Force Research report (October 2004)
  • 17
    • 38049052578 scopus 로고    scopus 로고
    • Kolmogorov Complexity Estimates for Detection of Viruses
    • Goel, S.: Kolmogorov Complexity Estimates for Detection of Viruses. Complexity Journal 9(2) (2003)
    • (2003) Complexity Journal , vol.9 , Issue.2
    • Goel, S.1
  • 18
    • 38049063086 scopus 로고    scopus 로고
    • Steganalysis http://niels.xtdnet.nl/stego/
    • Steganalysis
  • 19
    • 33846854810 scopus 로고    scopus 로고
    • Available from
    • K2. ADMmutate (2001) Available from http://www.ktwo.ca/security.html
    • (2001) K2. ADMmutate
  • 21
    • 33750343827 scopus 로고    scopus 로고
    • Advanced Polymorphic Worms: Evading IDS by Blending in with Normal Traffic
    • Georgia Tech: Vancouver, BC, Canada
    • Kolesnikov, O., Lee, W.: Advanced Polymorphic Worms: Evading IDS by Blending in with Normal Traffic. USENIX Security Symposium, Georgia Tech: Vancouver, BC, Canada (2006)
    • (2006) USENIX Security Symposium
    • Kolesnikov, O.1    Lee, W.2
  • 22
    • 38049092076 scopus 로고    scopus 로고
    • Shaner: US Patent No. 5,991,714 November 1999
    • Shaner: US Patent No. 5,991,714 (November 1999)
  • 23
    • 38049043479 scopus 로고    scopus 로고
    • Song, Y., Locasto, M.E., Stavrou, A., Keromytis, A.D., Stolfo, S.J.: On the Infeasibility of Modeling Polymorphic Shellcode for Signature Detection Tech. report cucs-00707, Columbia University (February 2007)
    • Song, Y., Locasto, M.E., Stavrou, A., Keromytis, A.D., Stolfo, S.J.: On the Infeasibility of Modeling Polymorphic Shellcode for Signature Detection Tech. report cucs-00707, Columbia University (February 2007)
  • 24
    • 38049035522 scopus 로고    scopus 로고
    • Internet Norman SandBox Whitepaper
    • Natvig, K.: SandboxII: Internet Norman SandBox Whitepaper (2002)
    • (2002) SandboxII
    • Natvig, K.1
  • 28
    • 38049092577 scopus 로고    scopus 로고
    • POIFS
    • POIFS: http://jakarta.apache.org/
  • 29
    • 0014814325 scopus 로고
    • Space/time trade-offs in hash coding with allowable errors
    • Bloom, B.H.: Space/time trade-offs in hash coding with allowable errors. Communications of the ACM 13(7), 422-426 (1970)
    • (1970) Communications of the ACM , vol.13 , Issue.7 , pp. 422-426
    • Bloom, B.H.1
  • 30
    • 33745641552 scopus 로고    scopus 로고
    • Wang, K., Cretu, G., Stolfo, S.J.: Anomalous Payload-based Worm Detection and Signature Generation. In: Valdes, A., Zamboni, D. (eds.) RAID 2005. LNCS, 3858, Springer, Heidelberg (2006)
    • Wang, K., Cretu, G., Stolfo, S.J.: Anomalous Payload-based Worm Detection and Signature Generation. In: Valdes, A., Zamboni, D. (eds.) RAID 2005. LNCS, vol. 3858, Springer, Heidelberg (2006)
  • 32
    • 38049088396 scopus 로고    scopus 로고
    • http://vx.netlux.org/
  • 35
    • 84904088330 scopus 로고    scopus 로고
    • Automated Web Patrol with Strider HoneyMonkeys: Finding Web Sites That Exploit Browser Vulnerabilities
    • Wang, Y.-M., Beck, D., Jiang, X., Roussev, R.: Automated Web Patrol with Strider HoneyMonkeys: Finding Web Sites That Exploit Browser Vulnerabilities. In: NDSS 2006
    • (2006) NDSS
    • Wang, Y.-M.1    Beck, D.2    Jiang, X.3    Roussev, R.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.