메뉴 건너뛰기




Volumn 5, Issue 3, 2009, Pages 221-245

Detection of metamorphic and virtualization-based malware using algebraic specification

Author keywords

[No Author keywords available]

Indexed keywords

ALGEBRAIC SPECIFICATIONS; ANTIVIRUS SOFTWARES; ASSEMBLY PROGRAMMING; COUNTER MEASURES; IMPERATIVE PROGRAMMING LANGUAGES; INSTRUCTION SET; LATEST DEVELOPMENT; MALWARE DETECTION; MALWARES; MAUDE SPECIFICATIONS; PROOF OF CONCEPT; VIRTUALIZATIONS;

EID: 70349997951     PISSN: 17729890     EISSN: 17729904     Source Type: Journal    
DOI: 10.1007/s11416-008-0094-0     Document Type: Article
Times cited : (12)

References (30)
  • 1
    • 33746406796 scopus 로고    scopus 로고
    • Bruschi, D., Martignoni, L., Monga, M.: Detecting self-mutating malware using control-flow graph matching. In: Büschkes, R., Laskov, P. (eds) Conference on Detection of Intrusions and Malware and Vulnerability Assessment (DIMVA), vol. 4064 of Lecture Notes in Computer Science, pp. 129-143. Springer, Heidelberg (2006)
    • Bruschi, D., Martignoni, L., Monga, M.: Detecting self-mutating malware using control-flow graph matching. In: Büschkes, R., Laskov, P. (eds) Conference on Detection of Intrusions and Malware and Vulnerability Assessment (DIMVA), vol. 4064 of Lecture Notes in Computer Science, pp. 129-143. Springer, Heidelberg (2006).
  • 2
    • 70349996065 scopus 로고    scopus 로고
    • Bruschi, D., Martignoni, L., Monga, M.: Using code normalization for fighting self-mutating malware. In: Proceedings of the International Symposium on Secure Software Engineering (2006)
    • Bruschi, D., Martignoni, L., Monga, M.: Using code normalization for fighting self-mutating malware. In: Proceedings of the International Symposium on Secure Software Engineering (2006).
  • 3
    • 34047180006 scopus 로고    scopus 로고
    • Code normalization for self-mutating malware
    • Bruschi D., Martignoni L., Monga M: Code normalization for self-mutating malware. IEEE Secur. Priv. 5(2), 46-54 (2007).
    • (2007) IEEE Secur. Priv. , vol.5 , Issue.2 , pp. 46-54
    • Bruschi, D.1    Martignoni, L.2    Monga, M.3
  • 4
    • 70349987852 scopus 로고    scopus 로고
    • Chess, D.M., White, S.R.: An undetectable computer virus. In: Virus Bulletin Conference, September (2000)
    • Chess, D.M., White, S.R.: An undetectable computer virus. In: Virus Bulletin Conference, September (2000).
  • 5
    • 34547172114 scopus 로고    scopus 로고
    • Chouchane, M.R., Lakhotia, A.: Using engine signature to detect metamorphic malware. In: Proceedings of the Fourth ACM Workshop on Recurring Malcode (WORM), pp. 73-78 (2006)
    • Chouchane, M.R., Lakhotia, A.: Using engine signature to detect metamorphic malware. In: Proceedings of the Fourth ACM Workshop on Recurring Malcode (WORM), pp. 73-78 (2006).
  • 6
    • 34547172114 scopus 로고    scopus 로고
    • Christodorescu, M., Jha, S., Seshia, S.A., Song, D., Bryant, R.E.: Semantics-awChouchane, M.R., Lakhotia, A.: Using engine signature to detect metamorphic malware. In: Proceedings of the Fourth ACM Workshop on Recurring Malcode (WORM), pp. 73-78 (2006)
    • Christodorescu, M., Jha, S., Seshia, S.A., Song, D., Bryant, R.E.: Semantics-awChouchane, M.R., Lakhotia, A.: Using engine signature to detect metamorphic malware. In: Proceedings of the Fourth ACM Workshop on Recurring Malcode (WORM), pp. 73-78 (2006).
  • 7
    • 84928563923 scopus 로고    scopus 로고
    • Clavel, M., Durán, F., Eker, S., Lincoln, P., Martí-Oliet, N., Meseguer, J., Talcott, C.: The Maude 2.0 system. In: Nieuwenhuis, R. (ed.) Rewriting Techniques and Applications (RTA 2003), number 2706 in Lecture Notes in Computer Science, pp. 76-87. Springer, Heidelberg (2003)
    • Clavel, M., Durán, F., Eker, S., Lincoln, P., Martí-Oliet, N., Meseguer, J., Talcott, C.: The Maude 2.0 system. In: Nieuwenhuis, R. (ed.) Rewriting Techniques and Applications (RTA 2003), number 2706 in Lecture Notes in Computer Science, pp. 76-87. Springer, Heidelberg (2003).
  • 8
    • 70349990223 scopus 로고    scopus 로고
    • Filiol, E.:ComputerViruses: from Theory toApplications, chap. 5, pp. 151-163. Springer, Heidelberg (2005) ISBN 2287239391
    • Filiol, E.:ComputerViruses: from Theory toApplications, chap. 5, pp. 151-163. Springer, Heidelberg (2005) ISBN 2287239391.
  • 9
    • 34249862179 scopus 로고    scopus 로고
    • A statistical model for undecidable viral detection
    • Filiol E., Josse S.: A statistical model for undecidable viral detection. J. Comput. Virol. 3, 65-74 (2007).
    • (2007) J. Comput. Virol. , vol.3 , pp. 65-74
    • Filiol, E.1    Josse, S.2
  • 10
    • 53349091372 scopus 로고    scopus 로고
    • Garfinkel, T., Adams, K., Warfield, A., Franklin, J.: Compatibility is not transparency: VMM detection myths and realities. In: 11th Workshop on Hot Topics in Operating Systems (HOTOS-X) (2007)
    • Garfinkel, T., Adams, K., Warfield, A., Franklin, J.: Compatibility is not transparency: VMM detection myths and realities. In: 11th Workshop on Hot Topics in Operating Systems (HOTOS-X) (2007).
  • 11
    • 70349996049 scopus 로고    scopus 로고
    • Goguen, J.A., Malcolm, G.: Algebraic Semantics of Imperative Programs. Massachusetts Institute of Technology (1996) ISBN 026207172X
    • Goguen, J.A., Malcolm, G.: Algebraic Semantics of Imperative Programs. Massachusetts Institute of Technology (1996) ISBN 026207172X.
  • 13
    • 70349978548 scopus 로고    scopus 로고
    • ®64 and IA-32 Architectures Software Developer's Manual, November 2007
    • ®64 and IA-32 Architectures Software Developer's Manual, November 2007. http://www.intel.com/products/processor/manuals/index.htm Accessed 14 June (2008).
  • 14
    • 33751032041 scopus 로고    scopus 로고
    • King, S.T., Chen, P.M., Wang, Y.-M., Verbowski, C., Wang, H.J., Lorch, J.R.: SubVirt: Implementing malware with virtual machines. In: Proceedings of the 2006 IEEE Symposium on Security and Privacy (2006)
    • King, S.T., Chen, P.M., Wang, Y.-M., Verbowski, C., Wang, H.J., Lorch, J.R.: SubVirt: Implementing malware with virtual machines. In: Proceedings of the 2006 IEEE Symposium on Security and Privacy (2006).
  • 15
    • 18144364355 scopus 로고    scopus 로고
    • Lakhotia, A., Mohammed, M.: Imposing order on program statements to assist anti-virus scanners. In: Proceedings of Eleventh Working Conference on Reverse Engineering. IEEE Computer Society Press, New York (2004)
    • Lakhotia, A., Mohammed, M.: Imposing order on program statements to assist anti-virus scanners. In: Proceedings of Eleventh Working Conference on Reverse Engineering. IEEE Computer Society Press, New York (2004).
  • 16
    • 33646365858 scopus 로고    scopus 로고
    • Meseguer, J., Roşu, G.: The rewriting logic semantics project. In: Proceedings of the Second Workshop on Structural Operational Semantics (SOS 2005), vol. 156 of Electronic Notes in Theoretical Computer Science, pp. 27-56. Elsevier, Amsterdam (2005)
    • Meseguer, J., Roşu, G.: The rewriting logic semantics project. In: Proceedings of the Second Workshop on Structural Operational Semantics (SOS 2005), vol. 156 of Electronic Notes in Theoretical Computer Science, pp. 27-56. Elsevier, Amsterdam (2005).
  • 17
    • 33947139569 scopus 로고    scopus 로고
    • The rewriting logic semantics project
    • Meseguer J., Roşu G.: The rewriting logic semantics project. Theor. Comput. Sci. 373(3), 213-237 (2007).
    • (2007) Theor. Comput. Sci. , vol.373 , Issue.3 , pp. 213-237
    • Meseguer, J.1    Roşu, G.2
  • 18
    • 70349989048 scopus 로고    scopus 로고
    • Moinuddin Mohammed.: Zeroing in on metamorphic computer viruses. Master's thesis, University of Louisiana at Lafayette (2003)
    • Moinuddin Mohammed.: Zeroing in on metamorphic computer viruses. Master's thesis, University of Louisiana at Lafayette (2003).
  • 19
    • 34548223126 scopus 로고    scopus 로고
    • Preda, M.D., Christodorescu, M., Jha, S., Debray, S.: A semantics-based approach to malware detection. In: Proceedings of the 34th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages (POPL 2007) (2007)
    • Preda, M.D., Christodorescu, M., Jha, S., Debray, S.: A semantics-based approach to malware detection. In: Proceedings of the 34th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages (POPL 2007) (2007).
  • 20
    • 70349983585 scopus 로고    scopus 로고
    • Rutkowska, J.: Red Pill ... or how to detect VMM using (almost) one CPU instruction
    • Rutkowska, J.: Red Pill ... or how to detect VMM using (almost) one CPU instruction. http://www.invisiblethings.org/papers/redpill.html, November 2004. Accessed 14 June 2008.
  • 21
    • 70349982830 scopus 로고    scopus 로고
    • TM kernel for fun and profit. Black Hat Briefings 2006, Las Vegas, USA, August 2006, Accessed 14 June 2008
    • TM kernel for fun and profit. Black Hat Briefings 2006, Las Vegas, USA, August 2006. http://blackhat.com/presentations/bh-usa-06/BH-US-06-Rutkowska.pdf Accessed 14 June 2008.
  • 22
    • 70349981656 scopus 로고    scopus 로고
    • Ször, P.: The new 32-bit Medusa. Virus Bulletin, December 2000
    • Ször, P.: The new 32-bit Medusa. Virus Bulletin, December 2000.
  • 24
    • 70349997266 scopus 로고    scopus 로고
    • Ször, P., Ferrie, P.: Hunting for metamorphic. In: Virus Bulletin Conference Proceedings, 2001
    • Ször, P., Ferrie, P.: Hunting for metamorphic. In: Virus Bulletin Conference Proceedings, 2001.
  • 25
    • 34547197548 scopus 로고    scopus 로고
    • Walenstein, A., Mathur, R., Chouchane, M.R., Lakhotia, A.: Normalizing metamorphic malware using term rewriting. In: IEEE International Workshop on Source Code Analysis and Manipulation (SCAM 2006), 2006
    • Walenstein, A., Mathur, R., Chouchane, M.R., Lakhotia, A.: Normalizing metamorphic malware using term rewriting. In: IEEE International Workshop on Source Code Analysis and Manipulation (SCAM 2006), 2006.
  • 26
    • 33751196771 scopus 로고    scopus 로고
    • Detection of metamorphic computer viruses using algebraic specification
    • doi:10.1007/s11416-006-0023-z
    • Webster M., Malcolm G.: Detection of metamorphic computer viruses using algebraic specification. J. Comput. Virol. 2(3), 149-161 (2006) doi:10.1007/s11416-006-0023-z.
    • (2006) J. Comput. Virol. , vol.2 , Issue.3 , pp. 149-161
    • Webster, M.1    Malcolm, G.2
  • 27
    • 70349981643 scopus 로고    scopus 로고
    • Webster, M., Malcolm, G.: Detection of metamorphic and virtualization-based malware using algebraic specification-Maude specification, January 2008, Accessed 14 June 2008
    • Webster, M., Malcolm, G.: Detection of metamorphic and virtualization-based malware using algebraic specification-Maude specification, January 2008. http://www.csc.liv.ac.uk/~matt/pubs/maude/2/ Accessed 14 June 2008.
  • 28
    • 70349997267 scopus 로고    scopus 로고
    • Webster M., Malcolm, G.: Detection of metamorphic and virtualization-based malware using algebraic specification. In: Broucek, V., Filiol, E. (eds.) 17th European Institute for Computer Antivirus Research Annual Conference Proceedings (EICAR 2008), pp. 99-119, 2008
    • Webster M., Malcolm, G.: Detection of metamorphic and virtualization-based malware using algebraic specification. In: Broucek, V., Filiol, E. (eds.) 17th European Institute for Computer Antivirus Research Annual Conference Proceedings (EICAR 2008), pp. 99-119, 2008.
  • 29
    • 33751175813 scopus 로고    scopus 로고
    • Yoo, I., Ultes-Nitsche, U.: Non-signature based virus detection: towards establishing a unknown virus detection technique using SOM. J. Comput. Virol. 2(3), (2006)
    • Yoo, I., Ultes-Nitsche, U.: Non-signature based virus detection: towards establishing a unknown virus detection technique using SOM. J. Comput. Virol. 2(3), (2006).
  • 30
    • 20444452578 scopus 로고    scopus 로고
    • Yoo, I.: Visualizing Windows executable viruses using self-organizing maps. In: Proceedings of the 2004 ACM workshop on Visualization and data mining for computer security, 2004
    • Yoo, I.: Visualizing Windows executable viruses using self-organizing maps. In: Proceedings of the 2004 ACM workshop on Visualization and data mining for computer security, 2004.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.