메뉴 건너뛰기




Volumn , Issue , 2007, Pages 241-248

The design space of metamorphic malware

Author keywords

Metamorphic malware; Virus scanner

Indexed keywords

COMPUTER SYSTEM FIREWALLS; DESIGN; SCANNING;

EID: 77955172895     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (15)

References (20)
  • 1
    • 35348856143 scopus 로고    scopus 로고
    • Detecting Self-Mutating Malware Using Control Flow Graph Matching
    • Proceedings of the Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA), IEEE Computer Society
    • Bruschi, D., L. Martignoni, et al. (2006). Detecting Self-Mutating Malware Using Control Flow Graph Matching. Proceedings of the Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA), IEEE Computer Society.
    • (2006)
    • Bruschi, D.1    Martignoni, L.2
  • 2
    • 34047166855 scopus 로고    scopus 로고
    • Using Code Normalization for Fighting Self-Mutating Malware
    • Proceedings od the International Symposium of Secure Software Engineering, IEEE Computer Society
    • Bruschi, D., L. Martignoni, et al. (2006). Using Code Normalization for Fighting Self-Mutating Malware. Proceedings od the International Symposium of Secure Software Engineering, IEEE Computer Society.
    • (2006)
    • Bruschi, D.1    Martignoni, L.2
  • 3
    • 84896452284 scopus 로고    scopus 로고
    • Metamorphism in practice or "How I made MetaPHOR and what I've learnt"
    • VX Heavens
    • Driller, M. (2002) Metamorphism in practice or "How I made MetaPHOR and what I've learnt". VX Heavens. http://vx.netlux.org/lib/vmd01.html.
    • (2002)
    • Driller, M.1
  • 4
    • 84896305038 scopus 로고    scopus 로고
    • Metamorphism: A Software Protection Mechanism
    • International Conference on Inforfmation Warfare (ICIW2006), University of Maryland Eastern Shore, USA
    • Dube, T. E., K. S. Edge, et al. (2006). Metamorphism: A Software Protection Mechanism. International Conference on Inforfmation Warfare (ICIW2006), University of Maryland Eastern Shore, USA.
    • (2006)
    • Dube, T.E.1    Edge, K.S.2
  • 5
    • 84896284654 scopus 로고    scopus 로고
    • A Taxonomy of Protection Used in Computer Viruses and Their Application to Software Protection
    • International Conference on Inforfmation Warfare (ICIW2006), University of Maryland Eastern Shore, USA
    • Edge, K.S., Dube, T.E., et al. (2006). A Taxonomy of Protection Used in Computer Viruses and Their Application to Software Protection, International Conference on Inforfmation Warfare (ICIW2006), University of Maryland Eastern Shore, USA.
    • (2006)
    • Edge, K.S.1    Dube, T.E.2
  • 7
    • 33746877417 scopus 로고    scopus 로고
    • Dealing with metamorphism
    • Jordon, M. (2002). Dealing with metamorphism. Virus Bulletin: 4-6.
    • (2002) Virus Bulletin , pp. 4-6
    • Jordon, M.1
  • 8
    • 33746389292 scopus 로고    scopus 로고
    • Polymorphic Worm Detection Using Structural Information of Executables
    • Proceedings of the International Symposium on Recent Advances in Intrusion Detection (RAID), Springer-Verlag
    • Kruegel, C., E. Kirda, et al. (2005). Polymorphic Worm Detection Using Structural Information of Executables. Proceedings of the International Symposium on Recent Advances in Intrusion Detection (RAID), Springer-Verlag.
    • (2005)
    • Kruegel, C.1    Kirda, E.2
  • 10
    • 34047145867 scopus 로고    scopus 로고
    • Are Metamorphic Viruses Really Invincible? - Part I
    • Lakhotia, A., A. Kapoor, et al. (2004). Are Metamorphic Viruses Really Invincible? - Part I. Virus Bulletin: 5-7.
    • (2004) Virus Bulletin , pp. 5-7
    • Lakhotia, A.1    Kapoor, A.2
  • 11
    • 52249108679 scopus 로고    scopus 로고
    • Are Metamorphic Viruses Really Invincible? - Part II
    • Lakhotia, A., A. Kapoor, et al. (2005). Are Metamorphic Viruses Really Invincible? - Part II. Virus Bulletin: 9-12.
    • (2005) Virus Bulletin , pp. 9-12
    • Lakhotia, A.1    Kapoor, A.2
  • 12
    • 84896466930 scopus 로고    scopus 로고
    • Imposing Order on Program Statements and its implication to AV Scanner
    • Proceedings of 11th IEEE Working Conference on Reverse Engineering, Delft, The Netherlands, IEEE Computer Society Press, Los Alamitos, CA
    • Lakhotia, A. and M. Mohammed (2004). Imposing Order on Program Statements and its implication to AV Scanner. Proceedings of 11th IEEE Working Conference on Reverse Engineering, Delft, The Netherlands, IEEE Computer Society Press, Los Alamitos, CA.
    • (2004)
    • Lakhotia, A.1    Mohammed, M.2
  • 13
    • 14344262813 scopus 로고    scopus 로고
    • Obfuscation of Executable Code to Improve Resistance to Static Disassembly
    • Conference on Computer and Communications Security, Washington D.C., USA, ACM: Association for Computing Machinery
    • Linn, C. and S. Debray (2003). Obfuscation of Executable Code to Improve Resistance to Static Disassembly. Conference on Computer and Communications Security, Washington D.C., USA, ACM: Association for Computing Machinery.
    • (2003)
    • Linn, C.1    Debray, S.2
  • 14
    • 84896457528 scopus 로고    scopus 로고
    • A Physiological Decomposition of Virus and Worm Programs
    • Center for Advanced Computer Studies, University of Louisiana, Lafayette
    • Singh, P. K. (2002). A Physiological Decomposition of Virus and Worm Programs. Center for Advanced Computer Studies, University of Louisiana, Lafayette.
    • (2002)
    • Singh, P.K.1
  • 15
    • 84896472444 scopus 로고    scopus 로고
    • Defeating Polymorphism: Beyond Emulation
    • Virus Bulletin Conference
    • Stepan, A. E. (2005). Defeating Polymorphism: Beyond Emulation. Virus Bulletin Conference.
    • (2005)
    • Stepan, A.E.1
  • 16
    • 33645264610 scopus 로고    scopus 로고
    • Hunting for metamorphic
    • Virus Bulletin Conference, Prague, Czech Republic
    • Ször, P. and P. Ferrie (2001). Hunting for metamorphic. Virus Bulletin Conference, Prague, Czech Republic.
    • (2001)
    • Ször, P.1    Ferrie, P.2
  • 17
    • 84896477311 scopus 로고    scopus 로고
    • Vecna, 29A E-Zine
    • Vecna (1998). Miss Lexotan 8, 29A E-Zine.
    • (1998) Miss Lexotan , vol.8
  • 18
    • 34547197548 scopus 로고    scopus 로고
    • Normalizing Metamorphic Malware Using Term Rewriting
    • Sixth IEEE International Workshop on Source Code Analysis and Manipulation (SCAM 2006)
    • Walenstein, A., R. Mathur, et al. (2006). Normalizing Metamorphic Malware Using Term Rewriting. Sixth IEEE International Workshop on Source Code Analysis and Manipulation (SCAM 2006).
    • (2006)
    • Walenstein, A.1    Mathur, R.2
  • 19
    • 84896478312 scopus 로고    scopus 로고
    • ZOmbie. About reversing. VX Heavens
    • ZOmbie. About reversing. VX Heavens. http://vx.netlux.org/lib/vzo14.html.
  • 20
    • 84896478617 scopus 로고    scopus 로고
    • ZOmbie. Some ideas about metamorphism. VX Heavens
    • ZOmbie. Some ideas about metamorphism. VX Heavens. http://vx.netlux.org/lib/vzo20.html.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.