메뉴 건너뛰기




Volumn , Issue , 2007, Pages 541-551

On the infeasibility of modeling polymorphic shellcode

Author keywords

Polymorphism; Shellcode; Signature generation; Statistical models

Indexed keywords

CURRENT SIGNATURES; DEFENSE MECHANISM; EMPIRICAL EVIDENCE; MALCODE; ON CURRENTS; POLYMORPHIC BEHAVIOR; PROOF OF CONCEPT; QUANTITATIVE ANALYSIS; SHELLCODE; SIGNATURE GENERATION; STATISTICAL MODELS;

EID: 41549098765     PISSN: 15437221     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1315245.1315312     Document Type: Conference Paper
Times cited : (82)

References (44)
  • 1
    • 0006100649 scopus 로고    scopus 로고
    • Smashing the stack for fun and profit
    • ALEPHONE
    • ALEPHONE. Smashing the Stack for Fun and Profit. Phrack 7, 49-14 (1996).
    • (1996) Phrack , vol.7 , pp. 49-14
  • 6
    • 77952397606 scopus 로고    scopus 로고
    • Shellforge Project
    • BIONDI, P. Shellforge Project, 2006. httpa://www.secdev.org/projects/ shellforge/.
    • (2006)
    • Biondi, P.1
  • 14
    • 77952336496 scopus 로고    scopus 로고
    • Smashing the Kernel Stack for Fun and Profit
    • EREN, S. Smashing the Kernel Stack for Fun and Profit. Phrack 11, 60-6 (2003).
    • (2003) Phrack , vol.11 , pp. 60-66
    • Eren, S.1
  • 19
    • 77952355531 scopus 로고    scopus 로고
    • K2. ADMmutate documentation
    • K2. ADMmutate documentation, 2003. httpa://www.ktwo.ca/ADMmutate-0.8.4. tar.gz.
    • (2003)
  • 26
    • 77952327721 scopus 로고    scopus 로고
    • METASPLOIT DEVELOPEMENT TEAM, Metasploit Project
    • METASPLOIT DEVELOPEMENT TEAM. Metasploit Project, 2006. httpa://www.metasploit.com.
    • (2006)
  • 30
    • 77952338015 scopus 로고    scopus 로고
    • Building IA32 'Unicode-Proof' Shellcodes
    • OBSCOU. Building IA32 'Unicode-Proof' Shellcodes. Phrack 11, 61-11 (2003).
    • (2003) Phrack , vol.11 , pp. 61-11
  • 32
    • 77952348035 scopus 로고    scopus 로고
    • Rix. Writing IA-32 Alphanumeric Shellcodes
    • Rix. Writing IA-32 Alphanumeric Shellcodes. Phrack 11, 57-15 (2001).
    • (2001) Phrack , vol.11 , pp. 57-15
  • 36
    • 77952339829 scopus 로고    scopus 로고
    • SNORT DEVELOPMENT TEAM. Snort Project
    • SNORT DEVELOPMENT TEAM. Snort Project. httpa://www.snort.org/.
  • 37
    • 0037269111 scopus 로고    scopus 로고
    • Reliable identification of bounded-length viruses is NP-complete
    • January
    • SPINELLIS, D. Reliable identification of bounded-length viruses is NP-complete. IEEE Transactions on Information Theory 49, 1 (January 2003), 280-284.
    • (2003) IEEE Transactions on Information Theory , vol.49 , Issue.1 , pp. 280-284
    • Spinellis, D.1
  • 39
    • 21844456680 scopus 로고    scopus 로고
    • Shield: Vulnerability-driven network filters for preventing known vulnerability exploits
    • August
    • WANG, H. J., GUO, C., SIMON, D. R., and ZUGENMAIER, A. Shield: Vulnerability-Driven Network Filters for Preventing Known Vulnerability Exploits. In Proceedings of the ACM SIGCOMM Conference (August 2004), pp. 193-204.
    • (2004) Proceedings of the ACM SIGCOMM Conference , pp. 193-204
    • Wang, H.J.1    Guo, C.2    Simon, D.R.3    Zugenmaier, A.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.