메뉴 건너뛰기




Volumn 5137 LNCS, Issue , 2008, Pages 143-163

On the limits of information flow techniques for malware analysis and containment

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER CRIME; STATIC ANALYSIS;

EID: 49949117136     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-70542-0_8     Document Type: Conference Paper
Times cited : (73)

References (46)
  • 3
    • 17144416882 scopus 로고    scopus 로고
    • Dynamo: A transparent dynamic optimization system
    • Bala, V., Duesterwald, E., Banerjia, S.: Dynamo: a transparent dynamic optimization system. SIGPLAN Not. 35(5) (2000)
    • (2000) SIGPLAN Not , vol.35 , Issue.5
    • Bala, V.1    Duesterwald, E.2    Banerjia, S.3
  • 6
    • 0003400251 scopus 로고
    • Secure computer systems: Mathematical foundations
    • Technical Report MTR-2547, 1, MITRE Corp
    • Bell, D.E., LaPadula, L.J.: Secure computer systems: Mathematical foundations. Technical Report MTR-2547, vol. 1, MITRE Corp. (1973)
    • (1973)
    • Bell, D.E.1    LaPadula, L.J.2
  • 8
    • 0003400255 scopus 로고
    • Integrity considerations for secure computer systems
    • Technical Report. ESDTR-76-372, USAF Electronic Systems Division, Hanscom Air Force Base, Bedford, Massachusetts
    • Biba, K.J.: Integrity considerations for secure computer systems. Technical Report. ESDTR-76-372, USAF Electronic Systems Division, Hanscom Air Force Base, Bedford, Massachusetts (1977)
    • (1977)
    • Biba, K.J.1
  • 12
    • 0017517624 scopus 로고
    • Certification of programs for secure information flow
    • Denning, D.E., Denning, P.J.: Certification of programs for secure information flow. Communications of the ACM 20(7) (1977)
    • (1977) Communications of the ACM , vol.20 , Issue.7
    • Denning, D.E.1    Denning, P.J.2
  • 14
    • 0016382977 scopus 로고
    • Memoryless subsystems
    • Fenton, J.S.: Memoryless subsystems. Computing Journal 17(2) (1974)
    • (1974) Computing Journal , vol.17 , Issue.2
    • Fenton, J.S.1
  • 17
    • 33745304805 scopus 로고    scopus 로고
    • Luk, C., Colin, R., Mutli, R., Patil, H., Klauser, A., Lowney, G., Wallace, S., Janapa Reddi, V., Hazelwood, K.: Pin: building customized program analysis tools with dynamic instrumentation. SIGPLAN Not. 40(6) (2005)
    • Luk, C., Colin, R., Mutli, R., Patil, H., Klauser, A., Lowney, G., Wallace, S., Janapa Reddi, V., Hazelwood, K.: Pin: building customized program analysis tools with dynamic instrumentation. SIGPLAN Not. 40(6) (2005)
  • 18
    • 49949109140 scopus 로고    scopus 로고
    • McAfee. W32/hiv. virus information library (2000)
    • McAfee. W32/hiv. virus information library (2000)
  • 19
    • 49949117691 scopus 로고    scopus 로고
    • McAfee. W32/mydoom@mm. virus information library (2004)
    • McAfee. W32/mydoom@mm. virus information library (2004)
  • 20
    • 0028058408 scopus 로고
    • A general theory of composition for trace sets closed under selective interleaving functions
    • McLean, J.: A general theory of composition for trace sets closed under selective interleaving functions. In: IEEE Symposium on Security and Privacy (1994)
    • (1994) IEEE Symposium on Security and Privacy
    • McLean, J.1
  • 21
    • 49949114531 scopus 로고    scopus 로고
    • PhD thesis, Department, of Computer Science, Stevens Institute of Technology
    • Medel, R.: Typed Assembly Languages for Software Security. PhD thesis, Department, of Computer Science, Stevens Institute of Technology (2006)
    • (2006) Typed Assembly Languages for Software Security
    • Medel, R.1
  • 22
    • 49949092544 scopus 로고    scopus 로고
    • Moser, A., Kruegel, C., Kirda, E.: Limits of static analysis for maiware detection. In: Choi, L., Paek, Y., Cho, S. (eds.) ACSAC 2007. LNCS, 4697. Springer, Heidelberg (2007)
    • Moser, A., Kruegel, C., Kirda, E.: Limits of static analysis for maiware detection. In: Choi, L., Paek, Y., Cho, S. (eds.) ACSAC 2007. LNCS, vol. 4697. Springer, Heidelberg (2007)
  • 23
    • 0032646625 scopus 로고    scopus 로고
    • JFlow: Practical mostly-static information flow control
    • Myers, A.C.: JFlow: Practical mostly-static information flow control. In: ACM POPL, pp. 228-241 (1999)
    • (1999) ACM POPL , pp. 228-241
    • Myers, A.C.1
  • 28
    • 33745661661 scopus 로고    scopus 로고
    • Pietraszek, T., Berghe, C.V.: Defending against injection attacks through context-sensitive suing evaluation. In: Valdes, A., Zamboni, D. (eds.) RAID 2005. LNCS, 3858, pp. 124-145. Springer, Heidelberg (2006)
    • Pietraszek, T., Berghe, C.V.: Defending against injection attacks through context-sensitive suing evaluation. In: Valdes, A., Zamboni, D. (eds.) RAID 2005. LNCS, vol. 3858, pp. 124-145. Springer, Heidelberg (2006)
  • 29
    • 34748920692 scopus 로고    scopus 로고
    • Argos: An emulator for fingerprinting zero-day attacks for advertised honeypots with automatic signature generation. SIGOPS
    • Portokalidis, G., Slowinska, A., Bos, H.: Argos: an emulator for fingerprinting zero-day attacks for advertised honeypots with automatic signature generation. SIGOPS Oper. Syst. Rev. 40(4) (2006)
    • (2006) Oper. Syst. Rev , vol.40 , Issue.4
    • Portokalidis, G.1    Slowinska, A.2    Bos, H.3
  • 31
    • 49949115582 scopus 로고    scopus 로고
    • Wojtczuk, R.N.: The Advanced return-into-lib(c) Exploits: PaX Case Study. Phrack Magazine 0x:0b(0x3o). Phile #0x04 of 0x0e (2001)
    • Wojtczuk, R.N.: The Advanced return-into-lib(c) Exploits: PaX Case Study. Phrack Magazine 0x:0b(0x3o). Phile #0x04 of 0x0e (2001)
  • 33
    • 49949089498 scopus 로고    scopus 로고
    • Saxena, P., Sekar, R., Puranik, V.: A practical technique for integrity protection from untrusted plug-ins. Technical Report SECLAB08-01, Stony Brook University (2008)
    • Saxena, P., Sekar, R., Puranik, V.: A practical technique for integrity protection from untrusted plug-ins. Technical Report SECLAB08-01, Stony Brook University (2008)
  • 34
    • 37849037807 scopus 로고    scopus 로고
    • Characterizing bots' remote control behavior
    • Hammerli, B.M, Sommer, R, eds, DIMVA 2007, Springer, Heidelberg
    • Stinson, E., Mitchell, J.C.: Characterizing bots' remote control behavior. In: Hammerli, B.M., Sommer, R. (eds.) DIMVA 2007. LNCS, vol. 4579, pp. 89-108. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4579 , pp. 89-108
    • Stinson, E.1    Mitchell, J.C.2
  • 37
    • 49949087442 scopus 로고    scopus 로고
    • Szor, P.: The Art. of Computer Virus Research and Defense. Symantec Press (2005)
    • Szor, P.: The Art. of Computer Virus Research and Defense. Symantec Press (2005)
  • 38
    • 49949105867 scopus 로고    scopus 로고
    • TrendMicro. Bkdr.surila.g (w32/ratos). virus encyclopedia (2004)
    • TrendMicro. Bkdr.surila.g (w32/ratos). virus encyclopedia (2004)
  • 42
    • 49949090309 scopus 로고    scopus 로고
    • Volpano, D.M.: Safety versus secrecy. In: Cortesi, A., Filé, G. (eds.) SAS 1999. LNCS, 1694. Springer, Heidelberg (1999)
    • Volpano, D.M.: Safety versus secrecy. In: Cortesi, A., Filé, G. (eds.) SAS 1999. LNCS, vol. 1694. Springer, Heidelberg (1999)
  • 43
    • 85038810709 scopus 로고    scopus 로고
    • Taint-enhanced policy enforcement: A practical approach to defeat, a wide range of attacks
    • Xu, W., Bhatkar, S., Sekar, R.: Taint-enhanced policy enforcement: A practical approach to defeat, a wide range of attacks. In: USENIX Security Symposium (2006)
    • (2006) USENIX Security Symposium
    • Xu, W.1    Bhatkar, S.2    Sekar, R.3
  • 44
    • 49949109537 scopus 로고    scopus 로고
    • Yin, H., Liang, Z., Song, D.: Hookfinder: Identifying and understanding maiware hooking behaviors. In: NDSS (2008)
    • Yin, H., Liang, Z., Song, D.: Hookfinder: Identifying and understanding maiware hooking behaviors. In: NDSS (2008)
  • 46
    • 33745771350 scopus 로고    scopus 로고
    • A typed assembly language for confidentiality
    • Sestoft, P, ed, ESOP 2006 and ETAPS 2006, Springer, Heidelberg
    • Yu, D., Islam, N.: A typed assembly language for confidentiality. In: Sestoft, P. (ed.) ESOP 2006 and ETAPS 2006. LNCS, vol. 3924, pp. 162-179. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.3924 , pp. 162-179
    • Yu, D.1    Islam, N.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.