메뉴 건너뛰기




Volumn 5758 LNCS, Issue , 2009, Pages 81-100

Malware behavioral detection by attribute-automata using abstraction from platform and language

Author keywords

Attribute Grammars; Behaviors; Interpretation; Malware

Indexed keywords

ABSTRACTION LAYER; DATAFLOW; DETECTION RATES; EXECUTABLES; FALSE POSITIVE; GENERIC APPROACH; INTERPRETED LANGUAGES; MALWARES; OBJECT CLASSIFICATION; PROCESSING SYSTEMS; SEMANTIC RULES; THEORETICAL RESULT; TWO LAYERS;

EID: 76649135461     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-04342-0_5     Document Type: Conference Paper
Times cited : (21)

References (22)
  • 2
    • 79953672829 scopus 로고    scopus 로고
    • Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software
    • Newsome, J., Song, D.: Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software. In: Proc. of the Network and Distributed System Security Symposium, NDSS (2005)
    • (2005) Proc. of the Network and Distributed System Security Symposium, NDSS
    • Newsome, J.1    Song, D.2
  • 6
    • 56549121841 scopus 로고    scopus 로고
    • Martignoni, L., Stinson, E., Fredrikson, M., Jha, S., Mitchell, J.C.: A layered architecture for detecting malicious behaviors. In: Lippmann, R., Kirda, E., Trachtenberg, A. (eds.) RAID 2008. LNCS, 5230, pp. 78-97. Springer, Heidelberg (2008)
    • Martignoni, L., Stinson, E., Fredrikson, M., Jha, S., Mitchell, J.C.: A layered architecture for detecting malicious behaviors. In: Lippmann, R., Kirda, E., Trachtenberg, A. (eds.) RAID 2008. LNCS, vol. 5230, pp. 78-97. Springer, Heidelberg (2008)
  • 7
    • 0001538613 scopus 로고
    • Semantics of context-free grammars
    • Knuth, D.E.: Semantics of context-free grammars. Theory of Computing Systems 2, 127-145 (1968)
    • (1968) Theory of Computing Systems , vol.2 , pp. 127-145
    • Knuth, D.E.1
  • 8
    • 48349094830 scopus 로고    scopus 로고
    • Malwares as interactive machines: A new framework for behavior modelling
    • Jacob, G., Filiol, E., Debar, H.: Malwares as interactive machines: A new framework for behavior modelling. Journal in Computer Virology 4(3), 235-250 (2008)
    • (2008) Journal in Computer Virology , vol.4 , Issue.3 , pp. 235-250
    • Jacob, G.1    Filiol, E.2    Debar, H.3
  • 10
    • 76649096504 scopus 로고
    • Orange Book
    • US Department of Defense:, Rainbow Series
    • US Department of Defense: "Orange Book" - Trusted Computer System Evaluation Criteria. Rainbow Series (1983)
    • (1983) Trusted Computer System Evaluation Criteria
  • 12
    • 0142157009 scopus 로고    scopus 로고
    • On the detection of anomalous system call arguments
    • Snekkenes, E, Gollmann, D, eds, ESORICS 2003, Springer, Heidelberg
    • Kruegel, C., Mutz, D., Valeur, F., Vigna, G.: On the detection of anomalous system call arguments. In: Snekkenes, E., Gollmann, D. (eds.) ESORICS 2003. LNCS, vol. 2808, pp. 326-343. Springer, Heidelberg (2003)
    • (2003) LNCS , vol.2808 , pp. 326-343
    • Kruegel, C.1    Mutz, D.2    Valeur, F.3    Vigna, G.4
  • 16
    • 76649114510 scopus 로고    scopus 로고
    • QEMU: Processor emulator, http://fabrice.bellard.free.fr/qemu/
    • QEMU: Processor emulator, http://fabrice.bellard.free.fr/qemu/
  • 18
  • 20
    • 76649143553 scopus 로고    scopus 로고
    • OffensiveComputing: Repository, http://www.offensivecomputing.net/
    • Repository
  • 21
    • 76649091758 scopus 로고    scopus 로고
    • Malware - behavior, tools, scripting and advanced analysis
    • Carrera, E.: Malware - behavior, tools, scripting and advanced analysis. In: HITBSec Conf. (2008)
    • (2008) HITBSec Conf
    • Carrera, E.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.