메뉴 건너뛰기




Volumn , Issue , 2009, Pages 621-634

Dispatcher: Enabling active botnet infiltration using automatic protocol reverse-engineering

Author keywords

Binary analysis; Botnet infiltration; Protocol reverse engineering

Indexed keywords

BINARY ANALYSIS; BOTNET INFILTRATION; BOTNETS; COMMAND-AND-CONTROL; CURRENT TECHNIQUES; MALICIOUS ACTIVITIES; MESSAGE FORMAT; PROTOCOL INFORMATION; PROTOCOL MESSAGE; PROTOCOL SPECIFICATIONS; SECURITY APPLICATION;

EID: 74049095923     PISSN: 15437221     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1653662.1653737     Document Type: Conference Paper
Times cited : (211)

References (49)
  • 1
    • 74049083497 scopus 로고    scopus 로고
    • AMD64 architecture tech docs. http://www.amd.com/us-en/Processors/ DevelopWithAMD/0,,30-2252-875-7044,00.html.
    • AMD64 architecture tech docs. http://www.amd.com/us-en/Processors/ DevelopWithAMD/0,,30-2252-875-7044,00.html.
  • 2
    • 76649131417 scopus 로고    scopus 로고
    • How Samba was written. http://samba.org/ftp/tridge/misc/french\-cafe.txt.
    • How Samba was written
  • 4
    • 74049096423 scopus 로고    scopus 로고
    • Intel64 and IA-32 architectures software developer's manuals
    • Intel64 and IA-32 architectures software developer's manuals. http://www.intel.com/products/processor/manuals/.
  • 6
    • 74049099237 scopus 로고    scopus 로고
    • Libyahoo2: A C library for Yahoo! Messenger. http://libyahoo2. sourceforge.net.
    • Libyahoo2: A C library for Yahoo! Messenger. http://libyahoo2. sourceforge.net.
  • 7
    • 74049105027 scopus 로고    scopus 로고
    • Marshal8e6 security threats: Email and web threats. http://www.marshal. com/newsimages/trace/Marshal8e6-TRACE-Report-Jan2009.pdf.
    • Marshal8e6 security threats: Email and web threats. http://www.marshal. com/newsimages/trace/Marshal8e6-TRACE-Report-Jan2009.pdf.
  • 11
    • 74049111682 scopus 로고    scopus 로고
    • The unofficial AIM/OSCAR protocol specification
    • The unofficial AIM/OSCAR protocol specification. http://www.oilcan.org/ oscar/.
  • 12
    • 74049144647 scopus 로고    scopus 로고
    • Wireshark. http://www.wireshark.org/.
    • Wireshark
  • 16
    • 74049142183 scopus 로고    scopus 로고
    • Rosetta: Extracting protocol semantics using binary analysis with applications to protocol replay and NAT rewriting
    • Technical Report CMU-CyLab-07-014, Cylab, Carnegie Mellon University, October
    • J. Caballero and D. Song. Rosetta: Extracting protocol semantics using binary analysis with applications to protocol replay and NAT rewriting. Technical Report CMU-CyLab-07-014, Cylab, Carnegie Mellon University, October 2007.
    • (2007)
    • Caballero, J.1    Song, D.2
  • 25
    • 84893143817 scopus 로고    scopus 로고
    • Discoverer: Automatic protocol description generation from network traces
    • Boston, MA, August
    • W. Cui, J. Kannan, and H. J. Wang. Discoverer: Automatic protocol description generation from network traces. In USENIX Security Symposium, Boston, MA, August 2007.
    • (2007) USENIX Security Symposium
    • Cui, W.1    Kannan, J.2    Wang, H.J.3
  • 28
    • 74049160166 scopus 로고    scopus 로고
    • N. Daswani, M. Stoppelman, and the Google Click Quality and Security Teams. The anatomy of Clickbot.A. In Workshop on Hot Topics in Understanding Botnets, April 2007.
    • N. Daswani, M. Stoppelman, and the Google Click Quality and Security Teams. The anatomy of Clickbot.A. In Workshop on Hot Topics in Understanding Botnets, April 2007.
  • 29
    • 85077692116 scopus 로고    scopus 로고
    • Dynamic application-layer protocol analysis for network intrusion detection
    • Vancouver, Canada, July
    • H. Dreger, A. Feldmann, M. Mai, V. Paxson, and R. Sommer. Dynamic application-layer protocol analysis for network intrusion detection. In USENIX Security Symposium, Vancouver, Canada, July 2006.
    • (2006) USENIX Security Symposium
    • Dreger, H.1    Feldmann, A.2    Mai, M.3    Paxson, V.4    Sommer, R.5
  • 34
    • 34547427252 scopus 로고    scopus 로고
    • Semi-automated discovery of application session structure
    • Rio de Janeiro, Brazil, October
    • J. Kannan, J. Jung, V. Paxson, and C. E. Koksal. Semi-automated discovery of application session structure. In Internet Measurement Conference, Rio de Janeiro, Brazil, October 2006.
    • (2006) Internet Measurement Conference
    • Kannan, J.1    Jung, J.2    Paxson, V.3    Koksal, C.E.4
  • 35
    • 59249094556 scopus 로고    scopus 로고
    • Automatic handling of protocol dependencies and reaction to 0-day attacks with ScriptGen based honeypots
    • Hamburg, Germany, September
    • C. Leita, M. Dacier, and F. Massicotte. Automatic handling of protocol dependencies and reaction to 0-day attacks with ScriptGen based honeypots. In International Symposium on Recent Advances in Intrusion Detection, Hamburg, Germany, September 2006.
    • (2006) International Symposium on Recent Advances in Intrusion Detection
    • Leita, C.1    Dacier, M.2    Massicotte, F.3
  • 38
    • 74049090626 scopus 로고    scopus 로고
    • Automatic protocol format reverse engineering through context-aware monitored execution
    • San Diego, CA, February
    • Z. Lin, X. Jiang, D. Xu, and X. Zhang. Automatic protocol format reverse engineering through context-aware monitored execution. In Network and Distributed System Security Symposium, San Diego, CA, February 2008.
    • (2008) Network and Distributed System Security Symposium
    • Lin, Z.1    Jiang, X.2    Xu, D.3    Zhang, X.4
  • 40
    • 33751426783 scopus 로고    scopus 로고
    • Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software
    • San Diego, CA, February
    • J. Newsome and D. Song. Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software. In Network and Distributed System Security Symposium, San Diego, CA, February 2005.
    • (2005) Network and Distributed System Security Symposium
    • Newsome, J.1    Song, D.2
  • 41
    • 34547396634 scopus 로고    scopus 로고
    • R. Pang, V. Paxson, R. Sommer, and L. Peterson. binpac: A yacc for writing application protocol parsers. In Internet Measurement Conference, Rio de Janeiro, Brazil, October 2006.
    • R. Pang, V. Paxson, R. Sommer, and L. Peterson. binpac: A yacc for writing application protocol parsers. In Internet Measurement Conference, Rio de Janeiro, Brazil, October 2006.
  • 42
    • 0033295259 scopus 로고    scopus 로고
    • Bro: A system for detecting network intruders in real-time
    • V. Paxson. Bro: A system for detecting network intruders in real-time. Computer Networks, 31(23-24), 1999.
    • (1999) Computer Networks , vol.31 , Issue.23-24
    • Paxson, V.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.