메뉴 건너뛰기




Volumn 5905 LNCS, Issue , 2009, Pages 178-192

A framework for behavior-based malware analysis in the cloud

Author keywords

[No Author keywords available]

Indexed keywords

BEHAVIOR-BASED; COMPUTATIONAL COSTS; DYNAMIC BEHAVIORS; END-USERS; EXECUTION ENVIRONMENTS; FINE-GRAINED ANALYSIS; MALICIOUS ACTIVITIES; MALWARES;

EID: 71549142277     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-10772-6_14     Document Type: Conference Paper
Times cited : (41)

References (27)
  • 1
    • 71549140753 scopus 로고    scopus 로고
    • Bayer, U., Kruegel, C., Kirda, E.: TTAnalyze: A Tool for Analyzing Malware. In: Proceedings of the Annual Conference of the European Institute for Computer Antivirus Research (2006)
    • Bayer, U., Kruegel, C., Kirda, E.: TTAnalyze: A Tool for Analyzing Malware. In: Proceedings of the Annual Conference of the European Institute for Computer Antivirus Research (2006)
  • 4
    • 84869669727 scopus 로고    scopus 로고
    • NovaShield: http://www.novashield.com/
    • NovaShield
  • 5
    • 84869689202 scopus 로고    scopus 로고
    • Panda Security: True Prevent, http://research.pandasecurity.com/archive/ How-TruPrevent-Works--2800-I-2900-.aspx
    • Panda Security: True Prevent
  • 6
    • 84869667852 scopus 로고    scopus 로고
    • Sana Security: http://www.sanasecurity.com/
    • Sana Security
  • 8
    • 34548772699 scopus 로고    scopus 로고
    • Towards Automatically Identifying Trigger-based Behavior in Malware using Symbolic Execution and Binary Analysis
    • Technical Report CMU-CS-07-105, Carnegie Mellon University
    • Brumley, D., Hartwig, C., Liang, Z., Newsome, J., Song, D., Yin, H.: Towards Automatically Identifying Trigger-based Behavior in Malware using Symbolic Execution and Binary Analysis. Technical Report CMU-CS-07-105, Carnegie Mellon University (2007)
    • (2007)
    • Brumley, D.1    Hartwig, C.2    Liang, Z.3    Newsome, J.4    Song, D.5    Yin, H.6
  • 13
    • 71549164714 scopus 로고    scopus 로고
    • NoAH Consortium: Containment environment design. Technical report, European Network of Affined Honeypots (2006)
    • NoAH Consortium: Containment environment design. Technical report, European Network of Affined Honeypots (2006)
  • 21
    • 67650803219 scopus 로고    scopus 로고
    • An Analysis of Conficker's Logic and Rendezvous Points
    • Technical report, SRI International
    • Porras, P., Saidi, H., Yegneswaran, V.: An Analysis of Conficker's Logic and Rendezvous Points. Technical report, SRI International (2009)
    • (2009)
    • Porras, P.1    Saidi, H.2    Yegneswaran, V.3
  • 24
    • 71549159549 scopus 로고    scopus 로고
    • Panda Security: From Traditional Antivirus to Collective Intelligence (2007)
    • Panda Security: From Traditional Antivirus to Collective Intelligence (2007)
  • 27
    • 84869688710 scopus 로고    scopus 로고
    • VirtualSquare: Remote System Call, http://wiki.virtualsquare.org/index. php/Remote-System-Call
    • Remote System Call


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.