메뉴 건너뛰기




Volumn , Issue , 2010, Pages 281-290

Reuse-oriented camouflaging trojan: Vulnerability detection and attack construction

Author keywords

[No Author keywords available]

Indexed keywords

ANOMALOUS BEHAVIOR; BINARY PROGRAMS; COMMUNICATION PROTOCOLS; NETWORK LEVEL; REAL-WORLD; TROJANS; VULNERABILITY DETECTION;

EID: 77956569612     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/DSN.2010.5544305     Document Type: Conference Paper
Times cited : (12)

References (31)
  • 1
    • 77956600078 scopus 로고    scopus 로고
    • Bitdefender malware and spam survey. http://news.bitdefender.com/NW1094- en-BitDefender-Malware-and-Spam-Survey-finds-E-Threats-Adapting-to-Online- Behavioral-Trends.html.
    • Bitdefender Malware and Spam Survey
  • 5
  • 6
    • 40749132125 scopus 로고    scopus 로고
    • Parasitic malware: The resurgence of an old threat
    • Parasitic malware: The resurgence of an old threat. Network Security, 2008(3): 15 - 18, 2008.
    • (2008) Network Security , vol.2008 , Issue.3 , pp. 15-18
  • 8
    • 0031635934 scopus 로고    scopus 로고
    • Garbage collection and local variable type-precision and liveness in java virtual machines
    • O. Agesen, D. Detlefs, and J. E. Moss. Garbage collection and local variable type-precision and liveness in java virtual machines. SIG-PLAN Not., 33(5):269-279, 1998.
    • (1998) SIG-PLAN Not , vol.33 , Issue.5 , pp. 269-279
    • Agesen, O.1    Detlefs, D.2    Moss, J.E.3
  • 9
    • 77956587807 scopus 로고
    • Space efficient conservative garbage collection
    • H.-J. Boehm. Space efficient conservative garbage collection. In ACM PLDI'93, 1993.
    • (1993) ACM PLDI'93
    • Boehm, H.-J.1
  • 10
    • 70349267779 scopus 로고    scopus 로고
    • When good instructions go bad: Generalizing return-oriented programming to RISC
    • E. Buchanan, R. Roemer, H. Shacham, and S. Savage. When good instructions go bad: Generalizing return-oriented programming to RISC. In ACM CCS'08, 2008.
    • (2008) ACM CCS'08
    • Buchanan, E.1    Roemer, R.2    Shacham, H.3    Savage, S.4
  • 11
    • 83455215100 scopus 로고    scopus 로고
    • Binary code extraction and interface identification for security applications
    • J. Caballero, N. M. Johnson, S. McCamant, and D. Song. Binary code extraction and interface identification for security applications. In ISOC NDSS'10, 2010.
    • (2010) ISOC NDSS'10
    • Caballero, J.1    Johnson, N.M.2    McCamant, S.3    Song, D.4
  • 15
    • 77956583022 scopus 로고    scopus 로고
    • "Retum-to-libc" attack
    • August
    • S. Designer. "retum-to-libc" attack. Bugtraq, August 1997.
    • (1997) Bugtraq
    • Designer, S.1
  • 18
    • 0032313923 scopus 로고    scopus 로고
    • Intrusion detection using sequences of system calls
    • S. A. Hofmeyr, S. Forrest, and A. Somayaji. Intrusion detection using sequences of system calls. J. Computer Security, 6(3):151-180, 1998.
    • (1998) J. Computer Security , vol.6 , Issue.3 , pp. 151-180
    • Hofmeyr, S.A.1    Forrest, S.2    Somayaji, A.3
  • 19
    • 60049091978 scopus 로고    scopus 로고
    • Randomized instruction sets and runtime environments past research and future directions
    • A. D. Keromytis. Randomized instruction sets and runtime environments past research and future directions. IEEE Security and Privacy, 7(1):18-25, 2009.
    • (2009) IEEE Security and Privacy , vol.7 , Issue.1 , pp. 18-25
    • Keromytis, A.D.1
  • 20
    • 84988573115 scopus 로고
    • The design and implementation of tripwire: A file system integrity checker
    • G. H. Kim and E. H. Spafford. The design and implementation of tripwire: a file system integrity checker. In ACM CCS'94, 1994.
    • (1994) ACM CCS'94
    • Kim, G.H.1    Spafford, E.H.2
  • 23
    • 3042642332 scopus 로고    scopus 로고
    • The advanced return-into-lib(c) exploits: Pax case study
    • Nergal. The advanced return-into-lib(c) exploits: Pax case study. Phrack, 10(58), 2001.
    • (2001) Phrack , vol.10 , Issue.58
    • Nergal1
  • 24
    • 35448955692 scopus 로고    scopus 로고
    • Valgrind: A framework for heavyweight dynamic binary instrumentation
    • N. Nethercote and J. Seward. Valgrind: A framework for heavyweight dynamic binary instrumentation. In ACMPLDI'07, 2007.
    • (2007) ACMPLDI'07
    • Nethercote, N.1    Seward, J.2
  • 25
    • 27544444280 scopus 로고    scopus 로고
    • Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software
    • J. Newsome and D. Song. Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software. In ISOC NDSS'05, 2005.
    • (2005) ISOC NDSS'05
    • Newsome, J.1    Song, D.2
  • 27
    • 77952351839 scopus 로고    scopus 로고
    • The geometry of innocent flesh on the bone: Return-into-libc without function calls
    • H. Shacham. The geometry of innocent flesh on the bone: return-into-libc without function calls. In ACM CCS'07, 2007.
    • (2007) ACM CCS'07
    • Shacham, H.1
  • 29
    • 0034301988 scopus 로고    scopus 로고
    • Quantifying the closeness between program components and features
    • W. E. Wong, S. S. Gokhale, and J. R. Horgan. Quantifying the closeness between program components and features. J. Syst. Softw., 54(2):87-98, 2000.
    • (2000) J. Syst. Softw. , vol.54 , Issue.2 , pp. 87-98
    • Wong, W.E.1    Gokhale, S.S.2    Horgan, J.R.3
  • 30
    • 77950788046 scopus 로고    scopus 로고
    • Panorama: Capturing system-wide information flow for malware detection and analysis
    • H. Yin, D. Song, E. Manuel, C. Kruegel, and E. Kirda. Panorama: Capturing system-wide information flow for malware detection and analysis. In ACM CCS'07, 2007.
    • (2007) ACM CCS'07
    • Yin, H.1    Song, D.2    Manuel, E.3    Kruegel, C.4    Kirda, E.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.