메뉴 건너뛰기




Volumn , Issue , 2010, Pages 29-44

Inspector gadget: Automated extraction of proprietary gadgets from malware binaries

Author keywords

[No Author keywords available]

Indexed keywords

AUTOMATED EXTRACTION; CAN DESIGN; COMMAND AND CONTROL; COMPLEX TASK; MALICIOUS SOFTWARE; MALWARES; REAL-WORLD; SPECIFIC TASKS; STAND -ALONE; UNSOLVED PROBLEMS;

EID: 77955195701     PISSN: 10816011     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SP.2010.10     Document Type: Conference Paper
Times cited : (76)

References (44)
  • 8
    • 77955197992 scopus 로고    scopus 로고
    • Malware RCE: Debuggers and decryptor development
    • M. Ligh and G. Sinclair, "Malware RCE: Debuggers and Decryptor Development," Defcon 16, 2008.
    • (2008) Defcon , vol.16
    • Ligh, M.1    Sinclair, G.2
  • 12
    • 79953672829 scopus 로고    scopus 로고
    • Dynamic taint analysis for automatic detection, analysis, and signaturegeneration of exploits on commodity software
    • J. Newsome and D. X. Song, "Dynamic Taint Analysis for Automatic Detection, Analysis, and SignatureGeneration of Exploits on Commodity Software," in Network and Distributed System Security Symposium (NDSS), 2005.
    • (2005) Network and Distributed System Security Symposium (NDSS)
    • Newsome, J.1    Song, D.X.2
  • 32
    • 84871121204 scopus 로고    scopus 로고
    • Finjan Malicious Code Research
    • Finjan Malicious Code Research, "Malware Analysis Trojan Banker URLZone/Bebloh," http://www.finjan.com/ MCRCblog.aspx?EntryId=2345, 2009.
    • (2009) Malware Analysis Trojan Banker URLZone/Bebloh
  • 39
    • 77952351839 scopus 로고    scopus 로고
    • The Geometry of Innocent Flesh on the Bone: Return-into-libc Without Function Calls (on the x86)
    • H. Shacham, "The Geometry of Innocent Flesh on the Bone: Return-into-libc Without Function Calls (on the x86)" in ACM Conference on Computer and Communications Security (CCS), 2007.
    • (2007) ACM Conference on Computer and Communications Security (CCS)
    • Shacham, H.1
  • 40
    • 85029681162 scopus 로고    scopus 로고
    • Return-oriented rootkits: Bypassing kernel code integrity protection mechanisms
    • R. Hund, T. Holz, and F. Freiling, "Return-Oriented Rootkits: Bypassing Kernel Code Integrity Protection Mechanisms," in 18th USENIX Security Symposium, 2009.
    • (2009) 18th USENIX Security Symposium
    • Hund, R.1    Holz, T.2    Freiling, F.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.