메뉴 건너뛰기




Volumn 5, Issue 3, 2009, Pages 263-270

Architecture of a morphological malware detector

Author keywords

[No Author keywords available]

Indexed keywords

CONTROL FLOW GRAPHS; EFFICIENT CONSTRUCTION; GRAPH REWRITING; MALICIOUS CODES; MALWARE ATTACKS; MALWARES; REVERSE ENGINEERS; SEMANTIC ANALYSIS; SIGNATURE-MATCHING; TREE AUTOMATA;

EID: 70349990723     PISSN: 17729890     EISSN: 17729904     Source Type: Journal    
DOI: 10.1007/s11416-008-0102-4     Document Type: Article
Times cited : (40)

References (20)
  • 1
    • 70349988810 scopus 로고    scopus 로고
    • http://udis86.sourceforge.net.
  • 2
    • 70349992922 scopus 로고    scopus 로고
    • http://vx.netlux.org.
  • 3
    • 70349988811 scopus 로고    scopus 로고
    • http://www.clamav.net.
  • 4
    • 33947609379 scopus 로고    scopus 로고
    • On the possibility of practically obfuscating programs towards a unified perspective of code protection
    • Beaucamps Ph., Filiol E.: On the possibility of practically obfuscating programs towards a unified perspective of code protection. J. Comput. Virol. 3(1), 3-21 (2007).
    • (2007) J. Comput. Virol. , vol.3 , Issue.1 , pp. 3-21
    • Beaucamps, P.1    Filiol, E.2
  • 5
    • 70349985737 scopus 로고    scopus 로고
    • Bonfante, G., Kaczmarek, M., Marion, J.Y.: Control Flow Graphs as Malware Signatures. WTCV, May (2007)
    • Bonfante, G., Kaczmarek, M., Marion, J.Y.: Control Flow Graphs as Malware Signatures. WTCV, May (2007).
  • 6
    • 70349995324 scopus 로고    scopus 로고
    • Bruschi, D., Martignoni, L., Monga, M.: Detecting self-mutating malware using control-flow graph matching. Technical report, Università degli Studi di Milano, September (2006)
    • Bruschi, D., Martignoni, L., Monga, M.: Detecting self-mutating malware using control-flow graph matching. Technical report, Università degli Studi di Milano, September (2006).
  • 9
    • 27544433210 scopus 로고    scopus 로고
    • Christodorescu, M., Jha, S., Seshia, S.A., Song, D., Bryant, R.E.: Semantics-aware malware detection. In: IEEE Symposium on Security and Privacy (2005)
    • Christodorescu, M., Jha, S., Seshia, S.A., Song, D., Bryant, R.E.: Semantics-aware malware detection. In: IEEE Symposium on Security and Privacy (2005).
  • 10
    • 70349997021 scopus 로고    scopus 로고
    • Comon, H., Dauchet, M., Gilleron, R., Jacquemard, F., Lugiez, D., Tison, S., Tommasi, M.: Tree automata techniques and applications, 10, (1997). Available on
    • Comon, H., Dauchet, M., Gilleron, R., Jacquemard, F., Lugiez, D., Tison, S., Tommasi, M.: Tree automata techniques and applications, 10, (1997). Available on: http://www.grappa.univ-lille3.fr/tata.
  • 11
    • 34548223126 scopus 로고    scopus 로고
    • Dalla Preda, M., Christodorescu, M., Jha, S., Debray, S.: A semantics-based approach to malware detection. In: POPL'07 (2007)
    • Dalla Preda, M., Christodorescu, M., Jha, S., Debray, S.: A semantics-based approach to malware detection. In: POPL'07 (2007).
  • 14
    • 70349978316 scopus 로고    scopus 로고
    • Filiol, E.: Malware pattern scanning schemes secure against black-box analysis. In: 15th EICAR (2006)
    • Filiol, E.: Malware pattern scanning schemes secure against black-box analysis. In: 15th EICAR (2006).
  • 15
    • 70349999943 scopus 로고    scopus 로고
    • Gryaznov, D.: Scanners of the Year 2000: Heuristics. Proceedings of the 5th International Virus Bulletin (1999)
    • Gryaznov, D.: Scanners of the Year 2000: Heuristics. Proceedings of the 5th International Virus Bulletin (1999).
  • 16
    • 70349997012 scopus 로고    scopus 로고
    • Kephart, J.O., Arnold, W.C.: Automatic extraction of computer virus signatures. In: Proceedings of the Fourth Virus Bulletin International Conference, pp. 178-184 (1994)
    • Kephart, J.O., Arnold, W.C.: Automatic extraction of computer virus signatures. In: Proceedings of the Fourth Virus Bulletin International Conference, pp. 178-184 (1994).
  • 17
    • 0034838197 scopus 로고    scopus 로고
    • Schultz, M.G., Eskin, E., Zadok, E., Stolfo, S.J.: Data mining methods for detection of new malicious executables. In: Proceedings of the IEEE Symposium on Security and Privacy, p. 38 (2001)
    • Schultz, M.G., Eskin, E., Zadok, E., Stolfo, S.J.: Data mining methods for detection of new malicious executables. In: Proceedings of the IEEE Symposium on Security and Privacy, p. 38 (2001).
  • 18
    • 70349988808 scopus 로고    scopus 로고
    • Ször, P.: The Art of Computer Virus Research and Defense. Addison-Wesley Professional, Reading (2005)
    • Ször, P.: The Art of Computer Virus Research and Defense. Addison-Wesley Professional, Reading (2005).
  • 20
    • 34547197548 scopus 로고    scopus 로고
    • Normalizing metamorphic malware using term rewriting
    • Walenstein A., Mathur R., Chouchane M.R., Lakhotia A.: Normalizing metamorphic malware using term rewriting. SCAM 0, 75-84 (2006).
    • (2006) SCAM , vol.0 , pp. 75-84
    • Walenstein, A.1    Mathur, R.2    Chouchane, M.R.3    Lakhotia, A.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.