-
2
-
-
84860028995
-
-
Armadillo, http://www.siliconrealms.com.
-
Armadillo
-
-
-
4
-
-
70349291880
-
-
DYNINST API
-
DYNINST API. http://www.dyninst.org.
-
-
-
-
5
-
-
70349301152
-
-
FileMon for Windows. http://technet.microsoft ,com/en-us/sysinternals/ bb896642.aspx.
-
FileMon for Windows. http://technet.microsoft ,com/en-us/sysinternals/ bb896642.aspx.
-
-
-
-
7
-
-
70349284243
-
-
PEiD. http://www.peid.info.
-
PEiD
-
-
-
8
-
-
70349268857
-
-
PEiDSO. http://handlers.sans.org/jclausing/userdb.txt.
-
PEiDSO
-
-
-
9
-
-
70349287335
-
-
RegMon for Windows. http://technet.microsoft .com/en-us/sysinternals/ bb896652.aspx.
-
RegMon for Windows
-
-
-
10
-
-
70349282785
-
-
Themida. http://www.oreans.com/themida.php.
-
Themida
-
-
-
11
-
-
70349273495
-
-
VirtualPC
-
VirtualPC. http://www.microsoft.com/windows/ products/winfamily/ virtualpc/.
-
-
-
-
12
-
-
70349284240
-
-
VMWare. http://www.vmware.com.
-
VMWare
-
-
-
14
-
-
70349270386
-
-
AMD64 Architecture Programmer's Manual, 2: Sj'stem Programming, 2007.
-
AMD64 Architecture Programmer's Manual, Volume 2: Sj'stem Programming, 2007.
-
-
-
-
17
-
-
58149084148
-
Automated Classification and Analysis of Internet Malware
-
M. Bailey, J. Oberheide, J. Andersen, Z. M. Mao, F. Jahanian, and J. Nazario. Automated Classification and Analysis of Internet Malware. In RAID, 2007.
-
(2007)
RAID
-
-
Bailey, M.1
Oberheide, J.2
Andersen, J.3
Mao, Z.M.4
Jahanian, F.5
Nazario, J.6
-
18
-
-
21644433634
-
Xen and the Art of Virtualization
-
P. Barham, B. Dragovic, K. Fraser, S. Hand, T. Harris, A. Ho, R. Neugebauer, I. Pratt, and A. Warfield. Xen and the Art of Virtualization. In SOSP. pages 164-177, 2003.
-
(2003)
SOSP
, pp. 164-177
-
-
Barham, P.1
Dragovic, B.2
Fraser, K.3
Hand, S.4
Harris, T.5
Ho, A.6
Neugebauer, R.7
Pratt, I.8
Warfield, A.9
-
19
-
-
65149100972
-
TTanalyze: A Tool for Analyzing Malware
-
U. Bayer, C. Kruegel, and E. Kirda. TTanalyze: A Tool for Analyzing Malware. In EICAR, pages 180-192, 2006.
-
(2006)
EICAR
, pp. 180-192
-
-
Bayer, U.1
Kruegel, C.2
Kirda, E.3
-
20
-
-
85063636742
-
-
F. Bellard. QEMU, a Fast and Portable Dynamic Translator. In ATEC, pages 41-41, 2005.
-
F. Bellard. QEMU, a Fast and Portable Dynamic Translator. In ATEC, pages 41-41, 2005.
-
-
-
-
21
-
-
0346236349
-
-
Art and Science. Addison-Wesley Professional
-
M. Bishop. Computer Security: Art and Science. Addison-Wesley Professional, 2003.
-
(2003)
Computer Security
-
-
Bishop, M.1
-
22
-
-
33751068975
-
Siren: Catching Evasive Malware (Short Paper)
-
K. Borders, X. Zhao, and A. Prakash. Siren: Catching Evasive Malware (Short Paper). In S&P (Oakland), pages 78-85, 2006.
-
(2006)
S&P (Oakland)
, pp. 78-85
-
-
Borders, K.1
Zhao, X.2
Prakash, A.3
-
23
-
-
77952403312
-
-
J. Caballero, H. Yin, Z. Liang, and D. Song. Polyglot: Automatic Extraction of Protocol Message Format using Dynamic Binary Analysis. In CCS, 2007.
-
J. Caballero, H. Yin, Z. Liang, and D. Song. Polyglot: Automatic Extraction of Protocol Message Format using Dynamic Binary Analysis. In CCS, 2007.
-
-
-
-
24
-
-
27544433210
-
Semantics-Aware Malware Detection
-
M. Christodorescu, S. Jha, S. A. Seshia, D. Song, and R. E. Bryant. Semantics-Aware Malware Detection. In S&P (Oakland), pages 32-46, 2005.
-
(2005)
S&P (Oakland)
, pp. 32-46
-
-
Christodorescu, M.1
Jha, S.2
Seshia, S.A.3
Song, D.4
Bryant, R.E.5
-
25
-
-
37849017546
-
Mining Specifications of Malicious Behavior
-
M. Christodorescu, C. Kruegel, and S. Jha. Mining Specifications of Malicious Behavior. In ESEC/FSE, pages 5-14, 2007.
-
(2007)
ESEC/FSE
, pp. 5-14
-
-
Christodorescu, M.1
Kruegel, C.2
Jha, S.3
-
28
-
-
33845406801
-
A Virtual Machine Introspection Based Architecture for Intrusion Detection
-
T. Garfinkel and M. Rosenblum. A Virtual Machine Introspection Based Architecture for Intrusion Detection. In NDSS, 2003.
-
(2003)
NDSS
-
-
Garfinkel, T.1
Rosenblum, M.2
-
29
-
-
0010300118
-
Detours: Binary Interception of Win32 Functions
-
G. Hunt and D. Brubacher. Detours: Binary Interception of Win32 Functions. In WINSYM, pages 135-143, 1999.
-
(1999)
WINSYM
, pp. 135-143
-
-
Hunt, G.1
Brubacher, D.2
-
30
-
-
77950853188
-
-
X. Jiang, X. Wang, and D. Xu. Stealthy Malware Detection Through VMM-Based Out-of-the-Box Semantic View Reconstruction. In CCS, pages 128-138, 2007.
-
X. Jiang, X. Wang, and D. Xu. Stealthy Malware Detection Through VMM-Based "Out-of-the-Box" Semantic View Reconstruction. In CCS, pages 128-138, 2007.
-
-
-
-
31
-
-
33745678278
-
Virtual Playgrounds for Worm Behavior Investigation
-
X. Jiang, D. Xu, H. J. Wang, and E. H. Spafford. Virtual Playgrounds for Worm Behavior Investigation. In RAID, pages 1-21, 2005.
-
(2005)
RAID
, pp. 1-21
-
-
Jiang, X.1
Xu, D.2
Wang, H.J.3
Spafford, E.H.4
-
32
-
-
70349448915
-
Renovo: A Hidden Code Extractor for Packed Executables
-
M. G. Kang, P. Poosankam. and H. Yin. Renovo: A Hidden Code Extractor for Packed Executables. In WORM, 2007.
-
(2007)
WORM
-
-
Kang, M.G.1
Poosankam, P.2
Yin, H.3
-
33
-
-
21644451617
-
Detecting Kernel-Level Rootkits Through Binary Analysis
-
C. Kruegel, W. Robertson, and G. Vigna. Detecting Kernel-Level Rootkits Through Binary Analysis. In ACSAC, pages 91-100, 2004.
-
(2004)
ACSAC
, pp. 91-100
-
-
Kruegel, C.1
Robertson, W.2
Vigna, G.3
-
34
-
-
48649084773
-
OmniUnpack: Fast, Generic, and Safe Unpacking of Malware
-
L. Martignoni, M. Christodorescu, and S. Jha. OmniUnpack: Fast, Generic, and Safe Unpacking of Malware. In ACSAC, pages 431-441, 2007.
-
(2007)
ACSAC
, pp. 431-441
-
-
Martignoni, L.1
Christodorescu, M.2
Jha, S.3
-
35
-
-
70349278165
-
-
F. Perigaud. New Pill? http://cert.lexsi.com/weblog/ index.php/2008/03/ 21/223-new-pill, 2008.
-
(2008)
New Pill
-
-
Perigaud, F.1
-
38
-
-
57949115209
-
Covert Debugging: Circumventing Software Armoring
-
D. Quist and Valsmith. Covert Debugging: Circumventing Software Armoring. In Black Hat USA, 2007.
-
(2007)
Black Hat USA
-
-
Quist, D.1
Valsmith2
-
40
-
-
34748820878
-
PolyUnpack: Automating the Hidden-Code Extraction of Unpack-Executing Malware
-
P. Royal, M. Halpin, D. Dagon, R. Edmonds, and W. Lee. PolyUnpack: Automating the Hidden-Code Extraction of Unpack-Executing Malware. In ACSAC, pages 289-300, 2006.
-
(2006)
ACSAC
, pp. 289-300
-
-
Royal, P.1
Halpin, M.2
Dagon, D.3
Edmonds, R.4
Lee, W.5
-
43
-
-
33751041896
-
-
A. Vasudevan and R. Yerraballi. Stealth Breakpoints. In ACS AC, pages 381-392, 2005.
-
A. Vasudevan and R. Yerraballi. Stealth Breakpoints. In ACS AC, pages 381-392, 2005.
-
-
-
-
44
-
-
70349301150
-
-
A. Vasudevan and R. Yerraballi. Cobra: Fine-grained Malware Analysis using Stealth Localized-executions. In S&P (Oakland), pages 264-279, 2006.
-
A. Vasudevan and R. Yerraballi. Cobra: Fine-grained Malware Analysis using Stealth Localized-executions. In S&P (Oakland), pages 264-279, 2006.
-
-
-
-
45
-
-
33745824159
-
-
C. Wang and S. Ju. The Dilemma of Covert Channels Searching. In ICISC, pages 169-174, 2005.
-
C. Wang and S. Ju. The Dilemma of Covert Channels Searching. In ICISC, pages 169-174, 2005.
-
-
-
-
46
-
-
70349282782
-
-
Y.-M. Wang, D. Beck, X. Jiang. R. Roussev, C. Verbowski, S. Chen, and S. T. King. Automated Web Patrol with Strider HoneyMonkeys: Finding Web Sites That Exploit Browser Vulnerabilities. In NDSS, 2006.
-
Y.-M. Wang, D. Beck, X. Jiang. R. Roussev, C. Verbowski, S. Chen, and S. T. King. Automated Web Patrol with Strider HoneyMonkeys: Finding Web Sites That Exploit Browser Vulnerabilities. In NDSS, 2006.
-
-
-
-
48
-
-
77950788046
-
-
H. Yin, D. Song, M. Egele, C. Kruegel, and E. Kirda. Panorama: Capturing system-wide information flow for malware detection and analysis. In CCS. 2007.
-
H. Yin, D. Song, M. Egele, C. Kruegel, and E. Kirda. Panorama: Capturing system-wide information flow for malware detection and analysis. In CCS. 2007.
-
-
-
|