메뉴 건너뛰기




Volumn 5210 LNCS, Issue , 2008, Pages 1-17

Visual reverse engineering of binary and data files

Author keywords

[No Author keywords available]

Indexed keywords

CASE STUDIES; COMPUTER FILES; DATA FILES; DEBUGGERS; DESIGN PRINCIPLES; DISASSEMBLERS; FILE FORMATS; FILE STRUCTURES; GAIN INSIGHTS; SEMANTIC INFORMATIONS; SOFTWARE DEVELOPERS; STRESS TESTING; USE CASES;

EID: 56449110617     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-85933-8_1     Document Type: Conference Paper
Times cited : (83)

References (13)
  • 2
    • 0030421898 scopus 로고
    • Dotplot Patterns: A Literal Look at Pattern Languages
    • Helfman, J.: Dotplot Patterns: A Literal Look at Pattern Languages. TAPOS Journal 2(1), 31-41 (1995)
    • (1995) TAPOS Journal , vol.2 , Issue.1 , pp. 31-41
    • Helfman, J.1
  • 3
    • 56449110379 scopus 로고    scopus 로고
    • December 20, 2007)
    • Blackhat USA , last accessed
    • Kaminsky, D.: Black Ops 2006. Blackhat USA (2006) (last accessed December 20, 2007), http://www.doxpara.com/slid.es/dmk_blackops2006.ppt
    • (2006)
    • Kaminsky, D.1
  • 4
    • 20444452578 scopus 로고    scopus 로고
    • Visualizing Windows Executable Viruses Using Self-Organizing Maps
    • Yoo, I.: Visualizing Windows Executable Viruses Using Self-Organizing Maps. VizSec/DMSec (2004)
    • (2004) VizSec/DMSec
    • Yoo, I.1
  • 5
    • 54849432819 scopus 로고    scopus 로고
    • Digital Genome Mapping - Advanced Binary Malware Analysis
    • Carrera, E., Erdelyi, G.: Digital Genome Mapping - Advanced Binary Malware Analysis. In: Virus Bulletin Conference (2004)
    • (2004) Virus Bulletin Conference
    • Carrera, E.1    Erdelyi, G.2
  • 7
    • 56449103087 scopus 로고    scopus 로고
    • A different look at Bagle. F-Secure Weblog (23 September 2005) (last accessed December 20, 2007), http://www.f-secure.com/weblog/archives/00000662. html
    • A different look at Bagle. F-Secure Weblog (23 September 2005) (last accessed December 20, 2007), http://www.f-secure.com/weblog/archives/00000662. html
  • 8
    • 56449100541 scopus 로고    scopus 로고
    • Graphing malware. F-Secure Weblog (25 October 2005) (last accessed December 20, 2007), http://www.f-secure.com/weblog/archives/00000324.html
    • Graphing malware. F-Secure Weblog (25 October 2005) (last accessed December 20, 2007), http://www.f-secure.com/weblog/archives/00000324.html
  • 10
    • 56449099354 scopus 로고    scopus 로고
    • Flake, H.: Diff, Navigate, Audit - Three applications of graphs and graphing for security, Blackhat USA (2004) (last accessed December 20, 2007), http: //www.blackhat.com/presentations/bh-usa-04/bh-us-04-flake.pdf
    • Flake, H.: Diff, Navigate, Audit - Three applications of graphs and graphing for security, Blackhat USA (2004) (last accessed December 20, 2007), http: //www.blackhat.com/presentations/bh-usa-04/bh-us-04-flake.pdf
  • 12
    • 56449102612 scopus 로고    scopus 로고
    • Kaminsky, D.: Black Ops 2006 : Viz Edition. Chaos Computer Congress (2006) (last accessed May 1, 2008), http://www.doxpara.com/slides/ dmk_blackops2006_ccc.ppt
    • Kaminsky, D.: Black Ops 2006 : Viz Edition. Chaos Computer Congress (2006) (last accessed May 1, 2008), http://www.doxpara.com/slides/ dmk_blackops2006_ccc.ppt


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.