메뉴 건너뛰기




Volumn 5137 LNCS, Issue , 2008, Pages 64-87

Dynamic binary instrumentation-based framework for malware defense

Author keywords

Control data flow; Dynamic binary instrumentation; Execution context; Malware; Virtualization

Indexed keywords

BEHAVIORAL MODELING; BEHAVIORAL PATTERNS; CONTINUOUS LEARNING; CONTROL-DATA FLOW; CURRENT TECHNIQUES; DYNAMIC BINARY INSTRUMENTATION; EXECUTION CONTEXT; EXECUTION ENVIRONMENTS; EXECUTION TIMES; INFORMATION SECURITY; INTERNATIONAL CONFERENCES; MALICIOUS SOFTWARE; MALWARE; MALWARE ATTACKS; MALWARE DETECTION; OPERATING SYSTEMS; REAL ENVIRONMENTS; RUN-TIME MONITORING; SECURITY POLICIES; TESTING ENVIRONMENT; VIRTUALIZATION; VULNERABILITY ASSESSMENTS; WINDOWS XP;

EID: 49949108190     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-70542-0_4     Document Type: Conference Paper
Times cited : (25)

References (38)
  • 1
    • 49949112231 scopus 로고    scopus 로고
    • Computer Security Institute, CSI Survey
    • Computer Security Institute, CSI Survey 2007 (2007), http://www.gocsi.com
    • (2007)
  • 2
    • 49949104851 scopus 로고    scopus 로고
    • Virus Bulletin
    • Virus Bulletin (2007), http://www.virusbtn.com/news/2007
    • (2007)
  • 9
    • 35248895400 scopus 로고    scopus 로고
    • A service-oriented solution framework for distributed virus detection and vulnerability remediation (VDVR) system
    • July
    • Zhou, Q.: A service-oriented solution framework for distributed virus detection and vulnerability remediation (VDVR) system. In: Proc. Int. Gryptology Conf. Services Computing, pp. 569-573 (July 2007)
    • (2007) Proc. Int. Gryptology Conf. Services Computing , pp. 569-573
    • Zhou, Q.1
  • 10
    • 33744472260 scopus 로고    scopus 로고
    • A proxy automatic signature scheme using a compiler in distributed systems for unknown virus detection
    • Advanced Information Networking and Applications, pp, March
    • Shin-Jia, H., Kuang-Hsi, C.: A proxy automatic signature scheme using a compiler in distributed systems for unknown virus detection. In: Proc. Int. Conf. Advanced Information Networking and Applications, pp. 649-654 (March 2005)
    • (2005) Proc. Int. Conf , pp. 649-654
    • Shin-Jia, H.1    Kuang-Hsi, C.2
  • 11
    • 49949090113 scopus 로고    scopus 로고
    • Yoo, I., Ultes-Nitsche, U.: Adaptive detection, of worms/viruses in firewalls. In: Proc. Int. Conf. Security Technology (October 2004)
    • Yoo, I., Ultes-Nitsche, U.: Adaptive detection, of worms/viruses in firewalls. In: Proc. Int. Conf. Security Technology (October 2004)
  • 12
    • 34748865971 scopus 로고    scopus 로고
    • A feature selection and evaluation scheme for computer virus detection
    • December
    • Henchiri, O., Japkowicz, N.: A feature selection and evaluation scheme for computer virus detection. In: Proc. Int. Conf. Data Mining, pp. 891-895 (December 2006)
    • (2006) Proc. Int. Conf. Data Mining , pp. 891-895
    • Henchiri, O.1    Japkowicz, N.2
  • 13
    • 77950788046 scopus 로고    scopus 로고
    • Panorama: Capturing system-wide information flow for maiware detection and analysis
    • Computer and Communication Security, pp, October
    • Yin, H., Song, D., Egele, M., Kruegel, C., Kirda, E.: Panorama: Capturing system-wide information flow for maiware detection and analysis. In: Proc. ACM Conf. Computer and Communication Security, pp. 116-127 (October 2007)
    • (2007) Proc. ACM Conf , pp. 116-127
    • Yin, H.1    Song, D.2    Egele, M.3    Kruegel, C.4    Kirda, E.5
  • 14
    • 33745434458 scopus 로고    scopus 로고
    • Reverse code engineering: An in-depth analysis of the Bagle virus
    • Information Assurance and Security, pp, June
    • Rozinov, K.: Reverse code engineering: An in-depth analysis of the Bagle virus. In: Proc. Wkshp. Information Assurance and Security, pp. 380 387 (June 2005)
    • (2005) Proc. Wkshp , pp. 380-387
    • Rozinov, K.1
  • 18
    • 85084162735 scopus 로고    scopus 로고
    • Goldberg, I., Wagner, D., Thomas, R., Brewer, E.A.: A. secure environment for untrusted helper applications confining the wily hacker. In: Proc. Conf. USENIX Security Symp., pp. 1-13 (July 1996)
    • Goldberg, I., Wagner, D., Thomas, R., Brewer, E.A.: A. secure environment for untrusted helper applications confining the wily hacker. In: Proc. Conf. USENIX Security Symp., pp. 1-13 (July 1996)
  • 19
    • 85084160542 scopus 로고    scopus 로고
    • A flexible containment mechanism for executing untrusted code
    • August
    • Peterson, D.S., Bishop, M., Pandey, R.: A flexible containment mechanism for executing untrusted code. In: Proc. Conf. USENIX Security Symp., pp. 207-225 (August 2002)
    • (2002) Proc. Conf. USENIX Security Symp , pp. 207-225
    • Peterson, D.S.1    Bishop, M.2    Pandey, R.3
  • 21
    • 49949089503 scopus 로고    scopus 로고
    • VMWare Inc, Palo Alto
    • VMWare Inc., Palo Alto, VMWare browser appliance (2006), http://www.vmware.com/appliances/directory/browserapp.html
    • (2006) VMWare browser appliance
  • 24
    • 49949094042 scopus 로고    scopus 로고
    • Virtualization-assisted framework for prevention of software vulnerability based security attacks
    • Tech. Rep. CE-J07-001, Dept. of Electrical Engineering, Princeton University December
    • Aaraj, N., Raghunathan, A., Jha, N.K.: Virtualization-assisted framework for prevention of software vulnerability based security attacks. Tech. Rep. CE-J07-001, Dept. of Electrical Engineering, Princeton University (December 2007)
    • (2007)
    • Aaraj, N.1    Raghunathan, A.2    Jha, N.K.3
  • 26
    • 0036038345 scopus 로고    scopus 로고
    • Tracking down software bugs using automatic anomaly detection
    • May
    • Hangai, S., Lam, M.S.: Tracking down software bugs using automatic anomaly detection. In: Proc. Int. Conf. Software Engineering, pp. 291-301 (May 2002)
    • (2002) Proc. Int. Conf. Software Engineering , pp. 291-301
    • Hangai, S.1    Lam, M.S.2
  • 28
    • 49949118517 scopus 로고    scopus 로고
    • Symantec corporation
    • Symantec corporation, Cupertino, The digital immune system (2007), http://www.symantec.com/avcenter/reference/dis.tech.brief.pdf
    • (2007) Cupertino, The digital immune system
  • 33
    • 49949118688 scopus 로고    scopus 로고
    • VMWare Inc, Palo Alto
    • VMWare Inc., Palo Alto, Virtual Appliance Marketplace (2007), http://www.vmware.com/appliances
    • (2007) Virtual Appliance Marketplace
  • 34
    • 49949112772 scopus 로고    scopus 로고
    • VX Heavens (2007), http://vx.netlux.org
    • (2007)
    • Heavens, V.X.1
  • 35
  • 36
    • 49949084253 scopus 로고    scopus 로고
    • ELFCrypt (2005), http://www.infogreg.com/source-code/public-domain/ elfcrypt-v1.0.html
    • (2005)
    • ELFCrypt1
  • 38
    • 49949096889 scopus 로고    scopus 로고
    • Obfuscator download (2006), http://www.soft32.com/download.186322.html
    • (2006) Obfuscator download


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.