메뉴 건너뛰기




Volumn , Issue , 2008, Pages 17-23

An automatic anti-anti-VMware technique applicable for multi-stage packed malware

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER CRIME; PACKERS;

EID: 58149103803     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/MALWARE.2008.4690853     Document Type: Conference Paper
Times cited : (9)

References (17)
  • 1
    • 34250017073 scopus 로고    scopus 로고
    • Hiding virtualization from attackers and malware
    • Matthew Carpenter, Tom Liston, and Ed Sloudis. Hiding virtualization from attackers and malware. IEEE Security & Privacy, 5(3):62-65, 2007.
    • (2007) IEEE Security & Privacy , vol.5 , Issue.3 , pp. 62-65
    • Carpenter, M.1    Liston, T.2    Sloudis, E.3
  • 2
    • 58149101907 scopus 로고    scopus 로고
    • Peter Ferrie. Anti-unpacker tricks. http://www.datasecurity-event.com/ uploads/unpackers.pdf, May 2008. 2nd CARO Workshop.
    • Peter Ferrie. Anti-unpacker tricks. http://www.datasecurity-event.com/ uploads/unpackers.pdf, May 2008. 2nd CARO Workshop.
  • 4
    • 77952106586 scopus 로고    scopus 로고
    • Ken Kato. Vm back. http://chitchat.at.infoseek.co.jp/vmware/backdoor. html.
    • Vm back
    • Kato, K.1
  • 8
    • 58149085698 scopus 로고    scopus 로고
    • is running inside a virtual machine. project.com/system/VmDetect.asp, Apr
    • Elias Aka Lallous. Detect if your program is running inside a virtual machine. http://www.codeproject.com/system/VmDetect.asp, Apr 2005.
    • (2005) Detect if your program
    • Aka Lallous, E.1
  • 9
    • 58149087463 scopus 로고    scopus 로고
    • Tom Liston and Ed Sloudis. On the cutting edge: thwarting virtual machine detection. handlers. sans.org/tliston/ThwartingVMDetection-Liston-Skoudis.pdf, 2006.
    • Tom Liston and Ed Sloudis. On the cutting edge: thwarting virtual machine detection. handlers. sans.org/tliston/ThwartingVMDetection-Liston-Skoudis.pdf, 2006.
  • 10
    • 84891449361 scopus 로고    scopus 로고
    • Dirty money on the wires: The business models of cyber criminals
    • Montréal, Canada, Oct
    • Guillaume Lovet. Dirty money on the wires: The business models of cyber criminals. In Virus Bulletin 2006, Montréal, Canada, Oct 2006.
    • (2006) Virus Bulletin , vol.2006
    • Lovet, G.1
  • 11
    • 58149102490 scopus 로고    scopus 로고
    • Hamish O'Dea. Trapping worms in a virtual net. In Virus Bulletin 2004, Fairmont Chicago, Illinois, USA., Sep 2004.
    • Hamish O'Dea. Trapping worms in a virtual net. In Virus Bulletin 2004, Fairmont Chicago, Illinois, USA., Sep 2004.
  • 15
    • 85084161596 scopus 로고    scopus 로고
    • Analysis of the intel Pentium's ability to support a secure virtual machine monitor
    • Denver .CO, Aug
    • John Scott Robbin and Cynthia E. Irvine. Analysis of the intel Pentium's ability to support a secure virtual machine monitor. In Proceedings of the 9th USENIX Security Symposium, Denver .CO, Aug 2000.
    • (2000) Proceedings of the 9th USENIX Security Symposium
    • Scott Robbin, J.1    Irvine, C.E.2
  • 16
    • 58149093229 scopus 로고    scopus 로고
    • [ 16] Joanna Rutkowska. Red pill...or how to detect vmm using one cpu instruction. http://incisiblethings.org/papers/redpill.html, 2004.
    • [ 16] Joanna Rutkowska. Red pill...or how to detect vmm using one cpu instruction. http://incisiblethings.org/papers/redpill.html, 2004.
  • 17
    • 58149085338 scopus 로고    scopus 로고
    • Oreans Technologies
    • Oreans Technologies. Themida. http://www.oreans.com/ThemidaWhatsNew.php.
    • Themida


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.