메뉴 건너뛰기




Volumn 5352 LNCS, Issue , 2008, Pages 1-25

BitBlaze: A new approach to computer security via binary analysis

Author keywords

Binary analysis; Malware analysis and defense; Reverse engineering; Vulnerability analysis and defense

Indexed keywords

BINARY ANALYSIS; BROAD SPECTRUM; COMPUTER SECURITY; MALWARE ANALYSIS AND DEFENSE; NEW APPROACHES; NOVEL SOLUTIONS; PROGRAM VERIFICATION (PV); SECURITY APPLICATIONS; SECURITY PROBLEMS; VULNERABILITY ANALYSIS AND DEFENSE;

EID: 58449129985     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-89862-7_1     Document Type: Conference Paper
Times cited : (527)

References (43)
  • 1
    • 58449136154 scopus 로고    scopus 로고
    • CVC Lite documentation (Page checked 7/26/2008), http://www.cs.nyu.edu/ acsys/cvcl/doc/
    • CVC Lite documentation (Page checked 7/26/2008), http://www.cs.nyu.edu/ acsys/cvcl/doc/
  • 2
    • 84868867342 scopus 로고    scopus 로고
    • The DOT language Page checked 7/26
    • The DOT language (Page checked 7/26/2008), http://www.graphviz.org/doc/ info/lang.html
    • (2008)
  • 3
    • 58449095476 scopus 로고    scopus 로고
    • On the run - building dynamic modifiers for optimization, detection, and security. Original DynamoRIO announcement via PLDI tutorial (June 2002)
    • On the run - building dynamic modifiers for optimization, detection, and security. Original DynamoRIO announcement via PLDI tutorial (June 2002)
  • 4
    • 58449083407 scopus 로고    scopus 로고
    • ARM. ARM Architecture Reference Manual (2005) Doc. No. DDI-0100I
    • ARM. ARM Architecture Reference Manual (2005) Doc. No. DDI-0100I
  • 5
    • 47249123725 scopus 로고    scopus 로고
    • PhD thesis, Computer Science Department, University of Wisconsin at Madison August
    • Balakrishnan, G.: WYSINWYX: What You See Is Not What You eXecute. PhD thesis, Computer Science Department, University of Wisconsin at Madison (August 2007)
    • (2007) WYSINWYX: What You See Is Not What You eXecute
    • Balakrishnan, G.1
  • 6
    • 24644506256 scopus 로고    scopus 로고
    • Balakrishnan, G., Gruian, R., Reps, T, Teitelbaum, T: Codesurfer/x86 - a platform for analyzing x86 executables. In: Proceedings of the International Conference on Compiler Construction (April 2005)
    • Balakrishnan, G., Gruian, R., Reps, T, Teitelbaum, T: Codesurfer/x86 - a platform for analyzing x86 executables. In: Proceedings of the International Conference on Compiler Construction (April 2005)
  • 7
    • 85077688456 scopus 로고    scopus 로고
    • Towards automatic discovery of deviations in binary implementations with applications to error detection and fingerprint generation
    • Boston, MA August
    • Brumley, D., Caballero, J., Liang, Z., Newsome, L, Song, D.: Towards automatic discovery of deviations in binary implementations with applications to error detection and fingerprint generation. In: Proceedings of the USENIX Security Symposium, Boston, MA (August 2007)
    • (2007) Proceedings of the USENIX Security Symposium
    • Brumley, D.1    Caballero, J.2    Liang, Z.3    Newsome, L.4    Song, D.5
  • 8
    • 58449115871 scopus 로고    scopus 로고
    • Bitscope: Automatically dissecting malicious binaries
    • Technical Report CS-07-133, School of Computer Science, Carnegie Mellon University March
    • Brumley, D., Hartwig, C, Kang, M.G., Liang, Z., Newsome, J., Poosankam, P., Song, D.: Bitscope: Automatically dissecting malicious binaries. Technical Report CS-07-133, School of Computer Science, Carnegie Mellon University (March 2007)
    • (2007)
    • Brumley, D.1    Hartwig, C.2    Kang, M.G.3    Liang, Z.4    Newsome, J.5    Poosankam, P.6    Song, D.7
  • 9
    • 84882738195 scopus 로고    scopus 로고
    • Brumley, D., Hartwig, C, Liang, Z., Newsome, J., Poosankam, P., Song, D., Yin, H.: Automatically identifying trigger-based behavior in malware. In: Lee, W. Wang, C, Dagon, D. (eds.) Botnet Detection. Countering the Largest Security Threat Series: Advances in Information Security, 36, Springer, Heidelberg (2008)
    • Brumley, D., Hartwig, C, Liang, Z., Newsome, J., Poosankam, P., Song, D., Yin, H.: Automatically identifying trigger-based behavior in malware. In: Lee, W. Wang, C, Dagon, D. (eds.) Botnet Detection. Countering the Largest Security Threat Series: Advances in Information Security, vol. 36, Springer, Heidelberg (2008)
  • 10
    • 58449119017 scopus 로고    scopus 로고
    • Brumley, D., Hartwig, C, Liang, Z., Newsome, L, Song, D., Yin, H.: Towards automatically identifying trigger-based behavior in malware using symbolic execution and binary analysis. Technical Report CMU-CS-07-105, Carnegie Mellon University School of Computer Science (January 2007)
    • Brumley, D., Hartwig, C, Liang, Z., Newsome, L, Song, D., Yin, H.: Towards automatically identifying trigger-based behavior in malware using symbolic execution and binary analysis. Technical Report CMU-CS-07-105, Carnegie Mellon University School of Computer Science (January 2007)
  • 13
    • 35048885595 scopus 로고    scopus 로고
    • Brumley, D., Wang, H., Jha, S., Song, D.: Creating vulnerability signatures using weakest pre-conditions. In: Proceedings of Computer Security Foundations Symposium (July 2007)
    • Brumley, D., Wang, H., Jha, S., Song, D.: Creating vulnerability signatures using weakest pre-conditions. In: Proceedings of Computer Security Foundations Symposium (July 2007)
  • 15
    • 77952403312 scopus 로고    scopus 로고
    • Caballero, J., Yin, H., Liang, Z., Song, D.: Polyglot: Automatic extraction of protocol message format using dynamic binary analysis. In: Proceedings of the ACM Conference on Computer and Communications Security (October 2007)
    • Caballero, J., Yin, H., Liang, Z., Song, D.: Polyglot: Automatic extraction of protocol message format using dynamic binary analysis. In: Proceedings of the ACM Conference on Computer and Communications Security (October 2007)
  • 17
    • 84885679117 scopus 로고    scopus 로고
    • Costa, M., Crowcroft, J., Castro, M., Rowstron, A., Zhou, L., Zhang, L., Barham P.: Vigilante: End-to-end containment of internet worms. In: In Proceedings of the Symposium on Systems and Operating Systems Principles (SOSP 2005) (2005)
    • Costa, M., Crowcroft, J., Castro, M., Rowstron, A., Zhou, L., Zhang, L., Barham P.: Vigilante: End-to-end containment of internet worms. In: In Proceedings of the Symposium on Systems and Operating Systems Principles (SOSP 2005) (2005)
  • 19
    • 58449088874 scopus 로고    scopus 로고
    • DataRescue. IDA Pro. (Page checked 7/31/2008), http:/ /www.datarescue.com
    • DataRescue. IDA Pro. (Page checked 7/31/2008), http:/ /www.datarescue.com
  • 21
    • 58449091060 scopus 로고    scopus 로고
    • Ganesh, V., Dill, D.: STP: A decision procedure for bitvectors and arrays, http://theory.Stanford,edu/-vganesh/stp
    • Ganesh, V., Dill, D.: STP: A decision procedure for bitvectors and arrays, http://theory.Stanford,edu/-vganesh/stp
  • 22
    • 58449096546 scopus 로고    scopus 로고
    • Ganesh. V., Dill. D.L.: A decision procedure for bit-vectors and arrays. In: Damm, W., Hermanns, H. (eds.) CAV 2007. LNCS, 4590, pp. 524-536. Springer, Heidelberg (2007)
    • Ganesh. V., Dill. D.L.: A decision procedure for bit-vectors and arrays. In: Damm, W., Hermanns, H. (eds.) CAV 2007. LNCS, vol. 4590, pp. 524-536. Springer, Heidelberg (2007)
  • 24
    • 58449089642 scopus 로고    scopus 로고
    • Jackson, D., Rollins, E.J.: Chopping: A generalization of slicing. Technical Report CS-94-169, Carnegie Mellon University School of Computer Science (1994)
    • Jackson, D., Rollins, E.J.: Chopping: A generalization of slicing. Technical Report CS-94-169, Carnegie Mellon University School of Computer Science (1994)
  • 27
    • 31944440969 scopus 로고    scopus 로고
    • Luk, C.-K., Cohn, R. Muth, R., Patil, H. Klauser, A., Lowney, G., Wallace, S., Reddi, V.J., Hazelwood, K.: Pin: Building customized program analysis tools with dynamic instrumentation. In: Proceedings of the ACM Conference on Programming Language Design and Implementation (June 2005)
    • Luk, C.-K., Cohn, R. Muth, R., Patil, H. Klauser, A., Lowney, G., Wallace, S., Reddi, V.J., Hazelwood, K.: Pin: Building customized program analysis tools with dynamic instrumentation. In: Proceedings of the ACM Conference on Programming Language Design and Implementation (June 2005)
  • 28
    • 58449096853 scopus 로고    scopus 로고
    • Microsoft. Phoenix framework (Paged checked 7/31/2008), http://research.microsoft.com/phoenix/
    • Microsoft. Phoenix framework (Paged checked 7/31/2008), http://research.microsoft.com/phoenix/
  • 29
    • 58449115293 scopus 로고    scopus 로고
    • Microsoft. Phoenix project architect posting (Page checked 7/31/2008) (July 2008), http://forums.msdn.microsoft.com/en-US/phoenix/thread/ 90f5212c-05a-4aea-9a8f-a5840a6dl01d
    • Microsoft. Phoenix project architect posting (Page checked 7/31/2008) (July 2008), http://forums.msdn.microsoft.com/en-US/phoenix/thread/ 90f5212c-05a-4aea-9a8f-a5840a6dl01d
  • 33
    • 58449099787 scopus 로고    scopus 로고
    • Newsome, J., Brumley, D., Song, D.: Sting: An end-to-end self-healing system for defending against zero-day worm attacks. Technical Report CMU-CS-05-191, Carnegie Mellon University School of Computer Science (2006)
    • Newsome, J., Brumley, D., Song, D.: Sting: An end-to-end self-healing system for defending against zero-day worm attacks. Technical Report CMU-CS-05-191, Carnegie Mellon University School of Computer Science (2006)
  • 36
    • 84868875459 scopus 로고    scopus 로고
    • Qemu,http://fabrice.bellard.free.fr/qemu/
    • Qemu
  • 37
  • 39
    • 58449118118 scopus 로고    scopus 로고
    • Tridgell. A.: How samba was written (Checked on 8/21/2008) (August 2003). http://www.samba.org/ftp/tridge/misc/french-cafe . txt
    • Tridgell. A.: How samba was written (Checked on 8/21/2008) (August 2003). http://www.samba.org/ftp/tridge/misc/french-cafe . txt
  • 41
    • 84868876618 scopus 로고    scopus 로고
    • Valgrind, http :/ /valgrind.org
    • Valgrind


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.