메뉴 건너뛰기




Volumn , Issue , 2008, Pages 51-62

Ether: Malware analysis via hardware virtualization extensions

Author keywords

Dynamic analysis; Emu lation; Malware analysis; Unpacking; Virtualization

Indexed keywords

DETECTION SYSTEM; EMU-LATION; FOCAL POINTS; MALWARE ANALYSIS; MALWARES; NOVEL APPLICATIONS; OPERATING SYSTEMS; RUNTIMES; SECURITY THREATS; SIDE EFFECT; SOFTWARE COMPONENT; SYSTEM EMULATION; TECHNIQUES USED; UNPACKING; VIRTUALIZATION; VIRTUALIZATIONS;

EID: 70349240080     PISSN: 15437221     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1455770.1455779     Document Type: Conference Paper
Times cited : (579)

References (48)
  • 2
    • 84860028995 scopus 로고    scopus 로고
    • Armadillo, http://www.siliconrealms.com.
    • Armadillo
  • 4
    • 70349291880 scopus 로고    scopus 로고
    • DYNINST API
    • DYNINST API. http://www.dyninst.org.
  • 5
    • 70349301152 scopus 로고    scopus 로고
    • FileMon for Windows. http://technet.microsoft ,com/en-us/sysinternals/ bb896642.aspx.
    • FileMon for Windows. http://technet.microsoft ,com/en-us/sysinternals/ bb896642.aspx.
  • 7
    • 70349284243 scopus 로고    scopus 로고
    • PEiD. http://www.peid.info.
    • PEiD
  • 8
    • 70349268857 scopus 로고    scopus 로고
    • PEiDSO. http://handlers.sans.org/jclausing/userdb.txt.
    • PEiDSO
  • 9
    • 70349287335 scopus 로고    scopus 로고
    • RegMon for Windows. http://technet.microsoft .com/en-us/sysinternals/ bb896652.aspx.
    • RegMon for Windows
  • 10
    • 70349282785 scopus 로고    scopus 로고
    • Themida. http://www.oreans.com/themida.php.
    • Themida
  • 11
    • 70349273495 scopus 로고    scopus 로고
    • VirtualPC
    • VirtualPC. http://www.microsoft.com/windows/ products/winfamily/ virtualpc/.
  • 12
    • 70349284240 scopus 로고    scopus 로고
    • VMWare. http://www.vmware.com.
    • VMWare
  • 13
  • 14
    • 70349270386 scopus 로고    scopus 로고
    • AMD64 Architecture Programmer's Manual, 2: Sj'stem Programming, 2007.
    • AMD64 Architecture Programmer's Manual, Volume 2: Sj'stem Programming, 2007.
  • 19
    • 65149100972 scopus 로고    scopus 로고
    • TTanalyze: A Tool for Analyzing Malware
    • U. Bayer, C. Kruegel, and E. Kirda. TTanalyze: A Tool for Analyzing Malware. In EICAR, pages 180-192, 2006.
    • (2006) EICAR , pp. 180-192
    • Bayer, U.1    Kruegel, C.2    Kirda, E.3
  • 20
    • 85063636742 scopus 로고    scopus 로고
    • F. Bellard. QEMU, a Fast and Portable Dynamic Translator. In ATEC, pages 41-41, 2005.
    • F. Bellard. QEMU, a Fast and Portable Dynamic Translator. In ATEC, pages 41-41, 2005.
  • 21
    • 0346236349 scopus 로고    scopus 로고
    • Art and Science. Addison-Wesley Professional
    • M. Bishop. Computer Security: Art and Science. Addison-Wesley Professional, 2003.
    • (2003) Computer Security
    • Bishop, M.1
  • 22
    • 33751068975 scopus 로고    scopus 로고
    • Siren: Catching Evasive Malware (Short Paper)
    • K. Borders, X. Zhao, and A. Prakash. Siren: Catching Evasive Malware (Short Paper). In S&P (Oakland), pages 78-85, 2006.
    • (2006) S&P (Oakland) , pp. 78-85
    • Borders, K.1    Zhao, X.2    Prakash, A.3
  • 23
    • 77952403312 scopus 로고    scopus 로고
    • J. Caballero, H. Yin, Z. Liang, and D. Song. Polyglot: Automatic Extraction of Protocol Message Format using Dynamic Binary Analysis. In CCS, 2007.
    • J. Caballero, H. Yin, Z. Liang, and D. Song. Polyglot: Automatic Extraction of Protocol Message Format using Dynamic Binary Analysis. In CCS, 2007.
  • 25
    • 37849017546 scopus 로고    scopus 로고
    • Mining Specifications of Malicious Behavior
    • M. Christodorescu, C. Kruegel, and S. Jha. Mining Specifications of Malicious Behavior. In ESEC/FSE, pages 5-14, 2007.
    • (2007) ESEC/FSE , pp. 5-14
    • Christodorescu, M.1    Kruegel, C.2    Jha, S.3
  • 28
    • 33845406801 scopus 로고    scopus 로고
    • A Virtual Machine Introspection Based Architecture for Intrusion Detection
    • T. Garfinkel and M. Rosenblum. A Virtual Machine Introspection Based Architecture for Intrusion Detection. In NDSS, 2003.
    • (2003) NDSS
    • Garfinkel, T.1    Rosenblum, M.2
  • 29
    • 0010300118 scopus 로고    scopus 로고
    • Detours: Binary Interception of Win32 Functions
    • G. Hunt and D. Brubacher. Detours: Binary Interception of Win32 Functions. In WINSYM, pages 135-143, 1999.
    • (1999) WINSYM , pp. 135-143
    • Hunt, G.1    Brubacher, D.2
  • 30
    • 77950853188 scopus 로고    scopus 로고
    • X. Jiang, X. Wang, and D. Xu. Stealthy Malware Detection Through VMM-Based Out-of-the-Box Semantic View Reconstruction. In CCS, pages 128-138, 2007.
    • X. Jiang, X. Wang, and D. Xu. Stealthy Malware Detection Through VMM-Based "Out-of-the-Box" Semantic View Reconstruction. In CCS, pages 128-138, 2007.
  • 31
    • 33745678278 scopus 로고    scopus 로고
    • Virtual Playgrounds for Worm Behavior Investigation
    • X. Jiang, D. Xu, H. J. Wang, and E. H. Spafford. Virtual Playgrounds for Worm Behavior Investigation. In RAID, pages 1-21, 2005.
    • (2005) RAID , pp. 1-21
    • Jiang, X.1    Xu, D.2    Wang, H.J.3    Spafford, E.H.4
  • 32
    • 70349448915 scopus 로고    scopus 로고
    • Renovo: A Hidden Code Extractor for Packed Executables
    • M. G. Kang, P. Poosankam. and H. Yin. Renovo: A Hidden Code Extractor for Packed Executables. In WORM, 2007.
    • (2007) WORM
    • Kang, M.G.1    Poosankam, P.2    Yin, H.3
  • 33
    • 21644451617 scopus 로고    scopus 로고
    • Detecting Kernel-Level Rootkits Through Binary Analysis
    • C. Kruegel, W. Robertson, and G. Vigna. Detecting Kernel-Level Rootkits Through Binary Analysis. In ACSAC, pages 91-100, 2004.
    • (2004) ACSAC , pp. 91-100
    • Kruegel, C.1    Robertson, W.2    Vigna, G.3
  • 34
    • 48649084773 scopus 로고    scopus 로고
    • OmniUnpack: Fast, Generic, and Safe Unpacking of Malware
    • L. Martignoni, M. Christodorescu, and S. Jha. OmniUnpack: Fast, Generic, and Safe Unpacking of Malware. In ACSAC, pages 431-441, 2007.
    • (2007) ACSAC , pp. 431-441
    • Martignoni, L.1    Christodorescu, M.2    Jha, S.3
  • 35
    • 70349278165 scopus 로고    scopus 로고
    • F. Perigaud. New Pill? http://cert.lexsi.com/weblog/ index.php/2008/03/ 21/223-new-pill, 2008.
    • (2008) New Pill
    • Perigaud, F.1
  • 38
    • 57949115209 scopus 로고    scopus 로고
    • Covert Debugging: Circumventing Software Armoring
    • D. Quist and Valsmith. Covert Debugging: Circumventing Software Armoring. In Black Hat USA, 2007.
    • (2007) Black Hat USA
    • Quist, D.1    Valsmith2
  • 39
    • 38149030181 scopus 로고    scopus 로고
    • Detecting System Emulators
    • T. Raffetseder, C. Kruegel, and E. Kirda. Detecting System Emulators. In ISC, pages 1-18, 2007.
    • (2007) ISC , pp. 1-18
    • Raffetseder, T.1    Kruegel, C.2    Kirda, E.3
  • 40
    • 34748820878 scopus 로고    scopus 로고
    • PolyUnpack: Automating the Hidden-Code Extraction of Unpack-Executing Malware
    • P. Royal, M. Halpin, D. Dagon, R. Edmonds, and W. Lee. PolyUnpack: Automating the Hidden-Code Extraction of Unpack-Executing Malware. In ACSAC, pages 289-300, 2006.
    • (2006) ACSAC , pp. 289-300
    • Royal, P.1    Halpin, M.2    Dagon, D.3    Edmonds, R.4    Lee, W.5
  • 43
    • 33751041896 scopus 로고    scopus 로고
    • A. Vasudevan and R. Yerraballi. Stealth Breakpoints. In ACS AC, pages 381-392, 2005.
    • A. Vasudevan and R. Yerraballi. Stealth Breakpoints. In ACS AC, pages 381-392, 2005.
  • 44
    • 70349301150 scopus 로고    scopus 로고
    • A. Vasudevan and R. Yerraballi. Cobra: Fine-grained Malware Analysis using Stealth Localized-executions. In S&P (Oakland), pages 264-279, 2006.
    • A. Vasudevan and R. Yerraballi. Cobra: Fine-grained Malware Analysis using Stealth Localized-executions. In S&P (Oakland), pages 264-279, 2006.
  • 45
    • 33745824159 scopus 로고    scopus 로고
    • C. Wang and S. Ju. The Dilemma of Covert Channels Searching. In ICISC, pages 169-174, 2005.
    • C. Wang and S. Ju. The Dilemma of Covert Channels Searching. In ICISC, pages 169-174, 2005.
  • 46
    • 70349282782 scopus 로고    scopus 로고
    • Y.-M. Wang, D. Beck, X. Jiang. R. Roussev, C. Verbowski, S. Chen, and S. T. King. Automated Web Patrol with Strider HoneyMonkeys: Finding Web Sites That Exploit Browser Vulnerabilities. In NDSS, 2006.
    • Y.-M. Wang, D. Beck, X. Jiang. R. Roussev, C. Verbowski, S. Chen, and S. T. King. Automated Web Patrol with Strider HoneyMonkeys: Finding Web Sites That Exploit Browser Vulnerabilities. In NDSS, 2006.
  • 47
    • 34047110218 scopus 로고    scopus 로고
    • Toward Automated Dynamic Malware Analysis Using CWSandbox
    • C. Willems, T. Holz, and F. Freiling. Toward Automated Dynamic Malware Analysis Using CWSandbox. IEEE Security and Privacy, 5(2), 2007.
    • (2007) IEEE Security and Privacy , vol.5 , Issue.2
    • Willems, C.1    Holz, T.2    Freiling, F.3
  • 48
    • 77950788046 scopus 로고    scopus 로고
    • H. Yin, D. Song, M. Egele, C. Kruegel, and E. Kirda. Panorama: Capturing system-wide information flow for malware detection and analysis. In CCS. 2007.
    • H. Yin, D. Song, M. Egele, C. Kruegel, and E. Kirda. Panorama: Capturing system-wide information flow for malware detection and analysis. In CCS. 2007.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.