메뉴 건너뛰기




Volumn , Issue , 2008, Pages 289-298

STILL: Exploit code detection via static taint and initialization analyses

Author keywords

[No Author keywords available]

Indexed keywords

ANALYSIS APPROACHES; ANALYSIS SOLUTIONS; ANTI STATICS; CODE DETECTIONS; CODE OBFUSCATIONS; CONTROL FLOW GRAPHS; INITIALIZATION ANALYSIS; INTERNET SERVICES;

EID: 60649104827     PISSN: 10639527     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ACSAC.2008.37     Document Type: Conference Paper
Times cited : (55)

References (31)
  • 1
    • 84868904728 scopus 로고    scopus 로고
    • Computer emergency response team cert
    • Computer emergency response team (cert). http://www.cert.org.
  • 2
    • 60649109574 scopus 로고    scopus 로고
    • Intel ia-32 architecture software developer's manual 1:, Intel Corporation
    • Intel ia-32 architecture software developer's manual volume 1: Basic architecture. Intel Corporation.
    • Basic architecture
  • 4
    • 84868904730 scopus 로고    scopus 로고
    • The metasploit project
    • The metasploit project. http://www.metasploit.com.
  • 5
    • 84868904726 scopus 로고    scopus 로고
    • Microsoft security bulletin
    • Microsoft security bulletin. http://www.microsoft.com/technet/security/ current.aspx.
  • 6
    • 60649086323 scopus 로고    scopus 로고
    • the de facto standard for intrusion deetection/preventions. http://www.snort.org.
    • the de facto standard for intrusion deetection/preventions. http://www.snort.org.
  • 8
    • 33746405183 scopus 로고    scopus 로고
    • A fast static analysis approach to detect exploit code inside network flows
    • R. Chinchani and E. Van Den Berg. A fast static analysis approach to detect exploit code inside network flows. In RAID, 2005.
    • (2005) RAID
    • Chinchani, R.1    Van Den Berg, E.2
  • 9
    • 60649112208 scopus 로고    scopus 로고
    • C. Cifuentes and A. Fraboulet. Intraprocedural static slicing of binary executables
    • C. Cifuentes and A. Fraboulet. Intraprocedural static slicing of binary executables.
  • 10
    • 0004046658 scopus 로고    scopus 로고
    • A taxonomy of obfuscating transformations
    • Technical Report 148, University of Auckland, July
    • C. Collberg, C. Thomborson, and D. Low. A taxonomy of obfuscating transformations. Technical Report 148, University of Auckland, July 1997.
    • (1997)
    • Collberg, C.1    Thomborson, C.2    Low, D.3
  • 13
    • 77953319851 scopus 로고    scopus 로고
    • C. Ionescu. Getpc code. http://www.securityfocus.com/archive/82/327348/ 2006-01-03/1.
    • Getpc code
    • Ionescu, C.1
  • 14
    • 0016971687 scopus 로고
    • Symbolic execution and program testing
    • J. C. King. Symbolic execution and program testing. Communications of the ACM, 19(7), 1976.
    • (1976) Communications of the ACM , vol.19 , Issue.7
    • King, J.C.1
  • 15
    • 33746389292 scopus 로고    scopus 로고
    • Polymorphic worm detection using structural information of executables
    • C. Kruegel, E. Kirda, D. Mutz, W. Robertson, and G. Vigna. Polymorphic worm detection using structural information of executables. In RAID, 2005.
    • (2005) RAID
    • Kruegel, C.1    Kirda, E.2    Mutz, D.3    Robertson, W.4    Vigna, G.5
  • 17
    • 33751064824 scopus 로고    scopus 로고
    • Hamsa: Fast signature generation for zero-day polymorphic worms with provable attack resilience
    • May
    • Z. Li, M. Sanghi, Y. Chen, M. Y. Kao, and B. Chavez. Hamsa: Fast signature generation for zero-day polymorphic worms with provable attack resilience. In IEEE Symposium on Security and Privacy, May 2006.
    • (2006) IEEE Symposium on Security and Privacy
    • Li, Z.1    Sanghi, M.2    Chen, Y.3    Kao, M.Y.4    Chavez, B.5
  • 18
    • 14344262813 scopus 로고    scopus 로고
    • Obfuscation of executable code to improve resistance to static disassembly
    • C. Linn and S. Debray. Obfuscation of executable code to improve resistance to static disassembly. In ACM CCS, 2003.
    • (2003) ACM CCS
    • Linn, C.1    Debray, S.2
  • 22
    • 84868901454 scopus 로고    scopus 로고
    • Noir. Getpc code. http://www.securityfocus.com/archive/82/327100/2006-01- 03/1.
    • Getpc code
    • Noir1
  • 23
    • 35348858789 scopus 로고    scopus 로고
    • Network-level polymorphic shellcode detection using emulation
    • M. Polychronakis, K. G. Anagnostakis, and E. P. Markatos. Network-level polymorphic shellcode detection using emulation. In DIMVA, 2006.
    • (2006) DIMVA
    • Polychronakis, M.1    Anagnostakis, K.G.2    Markatos, E.P.3
  • 24
    • 14844309952 scopus 로고    scopus 로고
    • Earlybird system for real-time detection of unknown worms
    • Technical report, Univ. of California at San Diego
    • S. Singh, C. Estan, G. Varghese, and S. Savage. Earlybird system for real-time detection of unknown worms. Technical report, Univ. of California at San Diego, 2003.
    • (2003)
    • Singh, S.1    Estan, C.2    Varghese, G.3    Savage, S.4
  • 25
    • 33846887337 scopus 로고    scopus 로고
    • History and advances in windows shellcode
    • July
    • sk. History and advances in windows shellcode. Phrack, vol. 11, no. 62, July 2004.
    • (2004) Phrack , vol.11 , Issue.62
    • sk1
  • 27
    • 60649090576 scopus 로고    scopus 로고
    • Testing network-based intrusion detection signatures using mutant exploits
    • G. Vigna, W. Robertson, and D. Balzarotti. Testing network-based intrusion detection signatures using mutant exploits. In ACM CCS, 2005.
    • (2005) ACM CCS
    • Vigna, G.1    Robertson, W.2    Balzarotti, D.3
  • 31


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.