메뉴 건너뛰기




Volumn , Issue , 2009, Pages 329-332

Dynamic detection of unknown malicious exécutables based on API interception

Author keywords

API interception; Dynamic detection; Unknown malicious executables

Indexed keywords

API FUNCTION CALLS; API INTERCEPTION; APPLICATION PROGRAM INTERFACES; DYNAMIC DETECTION; MALICIOUS EXECUTABLES; NEW APPROACHES; SECURITY POLICY; UNKNOWN MALICIOUS EXECUTABLES;

EID: 70449427488     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/DBTA.2009.127     Document Type: Conference Paper
Times cited : (3)

References (13)
  • 1
    • 48349134267 scopus 로고    scopus 로고
    • Behavior detection of mal. ware: From a survey toward an established taxonomy
    • G. Jacob, H. Debar, and E. Filiol, "Behavior detection of mal. ware: from a survey toward an established taxonomy", Comput Virol, pp: 251-226,2008.
    • (2008) Comput Virol , pp. 251-1226
    • Jacob, G.1    Debar, H.2    Filiol, E.3
  • 2
    • 0035526078 scopus 로고    scopus 로고
    • Anatomy of malice
    • November
    • Stephen Cass, "Anatomy of malice", IEEE SPECTRUM, November. 2001.
    • (2001) IEEE SPECTRUM
    • Cass, S.1
  • 7
    • 84945161191 scopus 로고    scopus 로고
    • The art of computer virus research, and defense
    • Szor. P, "The art of computer virus research, and defense", Addison Wesley Reading, 2005.
    • (2005) Addison Wesley Reading
    • Szor, P.1
  • 11
    • 70449358943 scopus 로고    scopus 로고
    • server and desktop virtualization
    • VMware: server and desktop virtualization, http://www.vmware.com/, 2006.
    • (2006)
  • 13
    • 70449392829 scopus 로고    scopus 로고
    • iDefense Labs, http://labs.idefense.com/.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.