메뉴 건너뛰기




Volumn 30, Issue 5, 2008, Pages

A semantics-based approach to malware detection

Author keywords

Abstract interpretation; Malware detection; Obfuscation; Trace semantics

Indexed keywords

ABSTRACT INTERPRETATION; ABSTRACT INTERPRETATIONS; CURRENT DETECTORS; DETECTION SCHEMES; MALWARE; MALWARE DETECTION; OBFUSCATION; SIGNATURE MATCHING; SOFTWARE SECURITY; SOUNDNESS AND COMPLETENESS; STANDARD MODEL; SYNTACTIC APPROACH; SYNTACTIC PROPERTIES; TRACE SEMANTICS;

EID: 51849164885     PISSN: 01640925     EISSN: 15584593     Source Type: Journal    
DOI: 10.1145/1387673.1387674     Document Type: Article
Times cited : (81)

References (50)
  • 1
    • 0542362337 scopus 로고
    • An abstract theory of computer viruses
    • Proceedings of Advances in Cryptology CRYPTO'88, Springer, Berlin, Germany
    • ADLEMAN, L. M. 1988. An abstract theory of computer viruses. In Proceedings of Advances in Cryptology (CRYPTO'88). Lecture Notes in Computer Science, vol. 403. Springer, Berlin, Germany.
    • (1988) Lecture Notes in Computer Science , vol.403
    • ADLEMAN, L.M.1
  • 4
    • 51849160971 scopus 로고    scopus 로고
    • BRIESEMEISTER, L., PORRAS, P. A., AND TIWARI, A. 2005. Model checking of worm quarantine and counter-quarantine under a group defense. Tech. rep. SRI-CSL-05-03, Computer Science Laboratory. SRI International.
    • BRIESEMEISTER, L., PORRAS, P. A., AND TIWARI, A. 2005. Model checking of worm quarantine and counter-quarantine under a group defense. Tech. rep. SRI-CSL-05-03, Computer Science Laboratory. SRI International.
  • 5
    • 51849141053 scopus 로고    scopus 로고
    • CHESS, D. AND WHITE, S. 2000. An undetectable computer virus. In Proceedings of the Virus Bulletin Conference (VB2000). Virus Bulletin, Orlando, FL.
    • CHESS, D. AND WHITE, S. 2000. An undetectable computer virus. In Proceedings of the Virus Bulletin Conference (VB2000). Virus Bulletin, Orlando, FL.
  • 6
    • 84947229190 scopus 로고    scopus 로고
    • An approachtothe obfuscation of control-flow of sequential computer programs
    • Proceedings of the 4th International Information Security Conference ISC'01, G. Davida and Y. Frankel, Eds, Springer
    • CHOW, S., GU, Y., JOHNSON, H., AND ZAKHAROV,V. 2001. An approachtothe obfuscation of control-flow of sequential computer programs. In Proceedings of the 4th International Information Security Conference (ISC'01), G. Davida and Y. Frankel, Eds. Lecture Notes in Computer Science, vol. 2200. Springer, 144-155.
    • (2001) Lecture Notes in Computer Science , vol.2200 , pp. 144-155
    • CHOW, S.1    GU, Y.2    JOHNSON, H.3    ZAKHAROV, V.4
  • 10
    • 34547464948 scopus 로고    scopus 로고
    • Malware normalization
    • Tech. rep. 1539, University of Wisconsin, Madison. WI
    • CHRISTODORESCU, M., KINDER, J., JHA, S., KATZENBEISSER, S., AND VEITH, H. 2005. Malware normalization. Tech. rep. 1539, University of Wisconsin, Madison. WI.
    • (2005)
    • CHRISTODORESCU, M.1    KINDER, J.2    JHA, S.3    KATZENBEISSER, S.4    VEITH, H.5
  • 12
    • 0004246220 scopus 로고
    • Ph.D. thesis, University of Southern California
    • COHEN, F. 1985. Computer viruses. Ph.D. thesis, University of Southern California.
    • (1985) Computer viruses
    • COHEN, F.1
  • 13
    • 0024682488 scopus 로고
    • Computational aspects of computer viruses
    • COHEN, F. 1989. Computational aspects of computer viruses. Comput. Secur. 8, 4, 325.
    • (1989) Comput. Secur , vol.8 , Issue.4 , pp. 325
    • COHEN, F.1
  • 14
    • 0023294949 scopus 로고
    • Computer viruses: Theory and experiments
    • COHEN, F. B. 1987. Computer viruses: Theory and experiments. Comput. Secur. 6, 22-35.
    • (1987) Comput. Secur , vol.6 , pp. 22-35
    • COHEN, F.B.1
  • 15
    • 0004046658 scopus 로고    scopus 로고
    • A taxonomy of obfuscating transformations
    • Tech. rep. 148, Department of Computer Sciences, University of Auckland
    • COLLBERG, C., THOMBORSON, C., AND LOW, D. 1997. A taxonomy of obfuscating transformations. Tech. rep. 148, Department of Computer Sciences, University of Auckland.
    • (1997)
    • COLLBERG, C.1    THOMBORSON, C.2    LOW, D.3
  • 19
    • 0000963996 scopus 로고    scopus 로고
    • COUSOT, P. AND COUSOT, R. 1992. Abstract interpretation frameworks. J. Logic Comput. 2, 4 (Aug.), 511-547.
    • COUSOT, P. AND COUSOT, R. 1992. Abstract interpretation frameworks. J. Logic Comput. 2, 4 (Aug.), 511-547.
  • 23
    • 26444541676 scopus 로고    scopus 로고
    • Semantics-based code obfuscation by abstract interpretation
    • Proceedings of the 32nd International Colloquium on Automata, Languages and Programming ICALP'05, Springer
    • DALLA PREDA, M. AND GIACOBAZZI, R. 2005. Semantics-based code obfuscation by abstract interpretation. In Proceedings of the 32nd International Colloquium on Automata, Languages and Programming (ICALP'05). Lecture Notes in Computer Science, vol. 3580. Springer, 1325-1336.
    • (2005) Lecture Notes in Computer Science , vol.3580 , pp. 1325-1336
    • DALLA PREDA, M.1    GIACOBAZZI, R.2
  • 24
    • 51849129651 scopus 로고    scopus 로고
    • DETRISTAN, T., ULENSPIEGEL, T., MALCOM, Y., AND VON UNDERDUK, M. S. 2003. Polymorphic shellcode engine using spectrum analysis. Phrack 11, 61 http://www.phrack.org.
    • DETRISTAN, T., ULENSPIEGEL, T., MALCOM, Y., AND VON UNDERDUK, M. S. 2003. Polymorphic shellcode engine using spectrum analysis. Phrack 11, 61 http://www.phrack.org.
  • 26
    • 35248897174 scopus 로고    scopus 로고
    • An approach for detecting self-propagating email using anomaly detection
    • Proceedings of the 6th International Symposium on Recent Advances in Intrusion Detection RAID'03, G. Vigna, E. Jonsson, and C. Kruegel, Eds, Springer
    • GUPTA, A. AND SEKAR, R. 2003. An approach for detecting self-propagating email using anomaly detection. In Proceedings of the 6th International Symposium on Recent Advances in Intrusion Detection (RAID'03), G. Vigna, E. Jonsson, and C. Kruegel, Eds. Lecture Notes in Computer Science, vol. 2820. Springer, 55-72.
    • (2003) Lecture Notes in Computer Science , vol.2820 , pp. 55-72
    • GUPTA, A.1    SEKAR, R.2
  • 28
    • 33746877417 scopus 로고    scopus 로고
    • Dealing with metamorphism
    • JORDAN, M. 2002. Dealing with metamorphism. Virus Bull. 10, 4-6.
    • (2002) Virus Bull , vol.10 , pp. 4-6
    • JORDAN, M.1
  • 29
    • 26444526878 scopus 로고    scopus 로고
    • Detecting malicious code by model checking
    • Proceedings of the 2nd International Conference on Intrusion and Malware Detection and Vulnerability Assessment DIMVA'05, K. Julisch and C. Krügel, Eds, Springer
    • KINDER, J., KATZENBEISSER, S., SCHALLHART, C., AND VEITH, H. 2005. Detecting malicious code by model checking. In Proceedings of the 2nd International Conference on Intrusion and Malware Detection and Vulnerability Assessment (DIMVA'05), K. Julisch and C. Krügel, Eds. Lecture Notes in Computer Science, vol. 3548. Springer, 174-187.
    • (2005) Lecture Notes in Computer Science , vol.3548 , pp. 174-187
    • KINDER, J.1    KATZENBEISSER, S.2    SCHALLHART, C.3    VEITH, H.4
  • 32
    • 51849110045 scopus 로고    scopus 로고
    • Challenges in getting "formal" with viruses
    • LAKHOTIA, A. AND SINGH, P. K. 2000. Challenges in getting "formal" with viruses. In Virus Bull.
    • (2000) Virus Bull
    • LAKHOTIA, A.1    SINGH, P.K.2
  • 33
    • 84944193544 scopus 로고    scopus 로고
    • A data mining and CIDF based approach for detecting novel and distributed intrusions
    • Proceedings of the 3rd International Workshop on Recent Advances in Intrusion Detection RAID 2000, Springer
    • LEE, W., NIMBALKAR, R. A., YEE, K. K., PATIL, S. B., DESAI, P. H., TRAN, T. T., AND STOLFO, S. J. 2000. A data mining and CIDF based approach for detecting novel and distributed intrusions. In Proceedings of the 3rd International Workshop on Recent Advances in Intrusion Detection (RAID 2000). Lecture Notes in Computer Sciences, vol. 1907. Springer, 49-65.
    • (2000) Lecture Notes in Computer Sciences , vol.1907 , pp. 49-65
    • LEE, W.1    NIMBALKAR, R.A.2    YEE, K.K.3    PATIL, S.B.4    DESAI, P.H.5    TRAN, T.T.6    STOLFO, S.J.7
  • 35
  • 36
    • 33745456200 scopus 로고    scopus 로고
    • LI, W.-J., WANG, K., STOLFO, S. J., AND HERZOG, B. 2005. Fileprints: Identifying file types by n-gram analysis. In Proceedings of the 6th Annual IEEE Systems, Man, and Cybernetics (SMC) Workshop on Information Assurance (IAW'05). IEEE Computer Society, 64-71.
    • LI, W.-J., WANG, K., STOLFO, S. J., AND HERZOG, B. 2005. Fileprints: Identifying file types by n-gram analysis. In Proceedings of the 6th Annual IEEE Systems, Man, and Cybernetics (SMC) Workshop on Information Assurance (IAW'05). IEEE Computer Society, 64-71.
  • 39
    • 0012127229 scopus 로고    scopus 로고
    • Intrusion and intrusion detection
    • MCHUGH, J. 2001. Intrusion and intrusion detection. Int. J. Inform. Secu. 1, 1, 14-35.
    • (2001) Int. J. Inform. Secu , vol.1 , Issue.1 , pp. 14-35
    • MCHUGH, J.1
  • 40
    • 51849169154 scopus 로고    scopus 로고
    • MORLEY, P. 2001. Processing virus collections. In Proceedings of the Virus Bulletin Conference (VB2'001). Virus Bulletin, 129-134.
    • MORLEY, P. 2001. Processing virus collections. In Proceedings of the Virus Bulletin Conference (VB2'001). Virus Bulletin, 129-134.
  • 41
    • 0030736223 scopus 로고    scopus 로고
    • Computer virus-antivirus coevolution
    • NACHENBERG, C. 1997. Computer virus-antivirus coevolution. Comm. ACM 40, 1, 46-51.
    • (1997) Comm. ACM , vol.40 , Issue.1 , pp. 46-51
    • NACHENBERG, C.1
  • 42
    • 33846488392 scopus 로고    scopus 로고
    • Polymorphism
    • RAJAAT. 1999. Polymorphism. 29A Mag. 1, 3, 1-2.
    • (1999) 29A Mag. 1 , vol.3 , pp. 1-2
    • RAJAAT1
  • 43
    • 84946414079 scopus 로고    scopus 로고
    • Static verification of worm and virus behaviour in binary executables using model checking
    • IEEE Computer Society, Los Alamitos, CA, USA
    • SINGH, P. AND LAKHOTIA, A. 2003. Static verification of worm and virus behaviour in binary executables using model checking. In Proceedings of the 4th IEEE Information Assurance Workshop. IEEE Computer Society, Los Alamitos, CA, USA.
    • (2003) Proceedings of the 4th IEEE Information Assurance Workshop
    • SINGH, P.1    LAKHOTIA, A.2
  • 46
    • 51849107061 scopus 로고    scopus 로고
    • SZÖR, P. AND FERRIE, P. 2001. Hunting for metamorphic. In Proceedings of the Virus Bulletin Conference (VB2001). Virus Bulletin, 123-144.
    • SZÖR, P. AND FERRIE, P. 2001. Hunting for metamorphic. In Proceedings of the Virus Bulletin Conference (VB2001). Virus Bulletin, 123-144.
  • 47
    • 34547197548 scopus 로고    scopus 로고
    • WALENSTEIN, A., MATHURS, R. CHOUCHANE, M. R., AND, LAKHOTIA, A 2006. Normalizing Metamorphic Malware Using Term Rewriting. In Proceedings of the 6th International Workshop on Source Code Analysis and Manipulation (SCAM'06). 75-84, IEEE Computer Society Press.
    • WALENSTEIN, A., MATHURS, R. CHOUCHANE, M. R., AND, LAKHOTIA, A 2006. Normalizing Metamorphic Malware Using Term Rewriting. In Proceedings of the 6th International Workshop on Source Code Analysis and Manipulation (SCAM'06). 75-84, IEEE Computer Society Press.
  • 49
    • 51849083983 scopus 로고    scopus 로고
    • Published online athttp:// last accessed on Sep. 29, 2006
    • ZOMBIE. 2001a. Automated reverse engineering: Mistfall engine. Published online athttp://www.madchat.org//vxdevl/papers/vxers/Z0mbie/autorev. txt (last accessed on Sep. 29, 2006).
    • (2001) Automated reverse engineering: Mistfall engine
    • ZOMBIE1
  • 50
    • 51849118937 scopus 로고    scopus 로고
    • Published online at
    • ZOMBIE. 2001b. Real Permutating[sic] Engine. Published online at http://vx.netlux.org/vx.php?id=er05.
    • (2001) Real Permutating[sic] Engine
    • ZOMBIE1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.