메뉴 건너뛰기




Volumn , Issue , 2008, Pages 69-76

Function length as a tool for malware classification

Author keywords

[No Author keywords available]

Indexed keywords

FUNCTIONS; PROBABILITY DENSITY FUNCTION; SECURITY OF DATA;

EID: 58149093760     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/MALWARE.2008.4690860     Document Type: Conference Paper
Times cited : (111)

References (17)
  • 1
    • 77950137996 scopus 로고    scopus 로고
    • Accessed June 12, 2008
    • E. Carrera. 4×5: Reverse engineering automation with python, 2007. https://www.blackhat.corn/presentations/bh-usa-07/Carrera/Presentation/ bh-usa-07-carrera.pdf. slides 26-32, Accessed June 12, 2008.
    • (2007) 4×5: Reverse engineering automation with python
    • Carrera, E.1
  • 2
    • 84924223669 scopus 로고    scopus 로고
    • M. Christodorescu and S. Jha. Static analysis of executables to detect malicious patterns. In 12th USENIX Security Symposium, pages 169-186,2003.
    • M. Christodorescu and S. Jha. Static analysis of executables to detect malicious patterns. In 12th USENIX Security Symposium, pages 169-186,2003.
  • 4
    • 54849414050 scopus 로고    scopus 로고
    • An automated virus classification system
    • M. Qheorghescu. An automated virus classification system. In Virus Bulletin Conference October 2005, pages 294-300, 2005.
    • (2005) Virus Bulletin Conference October , vol.2005 , pp. 294-300
    • Qheorghescu, M.1
  • 5
    • 58149090561 scopus 로고    scopus 로고
    • Binary feature extraction and comparison
    • Auckland, December 3-5
    • A. Kapoor and J. Spurlock. Binary feature extraction and comparison. In Presentation at AVAR 2006, Auckland, December 3-5, 2006.
    • (2006) Presentation at AVAR 2006
    • Kapoor, A.1    Spurlock, J.2
  • 6
    • 85164392958 scopus 로고
    • A study of cross-validation and bootstrap for accuracy estimation and model selection
    • R. Kohavi. A study of cross-validation and bootstrap for accuracy estimation and model selection. In IJCAI, pages 1137-1145, 1995.
    • (1995) IJCAI , pp. 1137-1145
    • Kohavi, R.1
  • 7
    • 58149084990 scopus 로고    scopus 로고
    • Dealing with virtualization packers
    • Boris Lau. Dealing with virtualization packers, 2008. 2nd CARO Workshop.
    • (2008) 2nd CARO Workshop
    • Lau, B.1
  • 11
    • 58149085108 scopus 로고    scopus 로고
    • Reverse engineering Microsoft binaries
    • A. Sotirov. Reverse engineering Microsoft binaries. In Recon 2006,2006.
    • (2006) Recon 2006
    • Sotirov, A.1
  • 13
    • 80052319552 scopus 로고    scopus 로고
    • Hump and dump: Efficient generic unpacking using an ordered address execution histogram
    • Li Sun, Tim Ebringer, and Serdar Boztaş. Hump and dump: Efficient generic unpacking using an ordered address execution histogram. In 2nd CARO Workshop, 2008.
    • (2008) 2nd CARO Workshop
    • Sun, L.1    Ebringer, T.2    Boztaş, S.3
  • 14
    • 58149086572 scopus 로고    scopus 로고
    • http://www.datasecurity-event.com/uploads/hump-dump.pdf.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.