메뉴 건너뛰기




Volumn 6307 LNCS, Issue , 2010, Pages 97-117

Automatic discovery of parasitic malware

Author keywords

[No Author keywords available]

Indexed keywords

BENCHMARKING; INTRUSION DETECTION;

EID: 78249255488     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-15512-3_6     Document Type: Conference Paper
Times cited : (18)

References (41)
  • 4
    • 78249255050 scopus 로고    scopus 로고
    • Community Developers (last accessed April 15, 2010)
    • Community Developers. Ebtables, http://ebtables.sourceforge.net/ (last accessed April 15, 2010)
    • Ebtables
  • 13
    • 78249271892 scopus 로고    scopus 로고
    • last accessed April 15, 2010
    • IBM. Ibm page detailer, http://www.alphaworks.ibm.com/tech/pagedetailer/ download (last accessed April 15, 2010)
    • Ibm Page Detailer
  • 16
    • 78249244635 scopus 로고    scopus 로고
    • last accessed April 15, 2010
    • Kasslin, K.: Evolution of kernel-mode malware, http://igloo. engineeringforfun.com/malwares/ Kimmo-Kasslin-Evolution-of-kernel-mode-malware- v2.pdf (last accessed April 15, 2010)
    • Evolution of Kernel-mode Malware
    • Kasslin, K.1
  • 17
    • 0003552088 scopus 로고
    • Automatic extraction of computer virus signatures
    • Jersey, Channel Islands, UK
    • Kephart, J., Arnold, W.: Automatic extraction of computer virus signatures. In: Virus Bulletin, Jersey, Channel Islands, UK (1994)
    • (1994) Virus Bulletin
    • Kephart, J.1    Arnold, W.2
  • 21
    • 56549121841 scopus 로고    scopus 로고
    • A layered architecture for detectingmalicious behaviors
    • Lippmann, R.,Kirda, E.,Trachtenberg, A. (eds.) RAID 2008. Springer, Heidelberg
    • Martignoni, L., Stinson, E., Fredrikson, M., Jha, S., Mitchell, J.C.: A layered architecture for detectingmalicious behaviors. In: Lippmann, R.,Kirda, E.,Trachtenberg, A. (eds.) RAID 2008. LNCS, vol. 5230, pp. 78-97. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.5230 , pp. 78-97
    • Martignoni, L.1    Stinson, E.2    Fredrikson, M.3    Jha, S.4    Mitchell, J.C.5
  • 22
    • 78249251923 scopus 로고    scopus 로고
    • last accessed April 15, 2010
    • MSDN. Asynchronous procedure calls, http://msdn.microsoft.com/en-us/ library/ms681951VS.85.aspx (last accessed April 15, 2010)
    • Asynchronous Procedure Calls
  • 23
    • 78249263071 scopus 로고    scopus 로고
    • Storm Worm Process Injection from the Windows Kernel
    • last accessed April 15, 2010
    • OffensiveComputing. Storm Worm Process Injection from the Windows Kernel, http://www.offensivecomputing.net/?q=node/661 (last accessed April 15, 2010)
    • OffensiveComputing
  • 24
    • 78249248205 scopus 로고    scopus 로고
    • PassMark Performance Test
    • last accessed April 15, 2010
    • Passmark Software. PassMark Performance Test, http://www.passmark.com/ products/pt.htm (last accessed April 15, 2010)
    • Passmark Software
  • 29
    • 77954140057 scopus 로고
    • Load your 32-bit DLL into another process's address space using injlib
    • May
    • Richter, J.: Load your 32-bit DLL into another process's address space using injlib. Microsoft Systems Journal 9(5) (May 1994)
    • (1994) Microsoft Systems Journal , vol.9 , Issue.5
    • Richter, J.1
  • 30
    • 56549083677 scopus 로고    scopus 로고
    • Guest-transparent prevention of kernel rootkits with VMM-based memory shadowing
    • Lippmann, R., Kirda, E., Trachtenberg, A. (eds.) RAID 2008. Springer, Heidelberg
    • Riley, R., Jiang, X., Xu, D.: Guest-transparent prevention of kernel rootkits with VMM-based memory shadowing. In: Lippmann, R., Kirda, E., Trachtenberg, A. (eds.) RAID 2008. LNCS, vol. 5230, pp. 1-20. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.5230 , pp. 1-20
    • Riley, R.1    Jiang, X.2    Xu, D.3
  • 35
    • 56549109177 scopus 로고    scopus 로고
    • Tamper-resistant, application-aware blocking of malicious network connections
    • Lippmann, R., Kirda, E., Trachtenberg, A. (eds.) RAID 2008. Springer, Heidelberg
    • Srivastava, A., Giffin, J.: Tamper-resistant, application-aware blocking of malicious network connections. In: Lippmann, R., Kirda, E., Trachtenberg, A. (eds.) RAID 2008. LNCS, vol. 5230, pp. 39-58. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.5230 , pp. 39-58
    • Srivastava, A.1    Giffin, J.2
  • 38
    • 78249258881 scopus 로고    scopus 로고
    • Conficker/downadup: Memory injection model
    • last accessed April 15, 2010
    • ThreatExpert. Conficker/downadup: Memory injection model. http://blog.threatexpert.com/2009/01/ confickerdownadup-memory-injection.html (last accessed April 15, 2010)
    • ThreatExpert
  • 39
    • 84947603083 scopus 로고    scopus 로고
    • Probabilistic alert correlation
    • Lee, W., Mé, L., Wespi, A. (eds.) RAID 2001. Springer, Heidelberg
    • Valdes, A., Skinner, K.: Probabilistic alert correlation. In: Lee, W., Mé, L., Wespi, A. (eds.) RAID 2001. LNCS, vol. 2212, p. 54. Springer, Heidelberg (2001)
    • (2001) LNCS , vol.2212 , pp. 54
    • Valdes, A.1    Skinner, K.2
  • 41
    • 34047110218 scopus 로고    scopus 로고
    • Toward automated dynamic malware analysis using CWSandbox
    • DOI 10.1109/MSP.2007.45
    • Willems, C., Holz, T., Freiling, F.: Toward automated dynamic malware analysis using cwsandbox. IEEE Security & Privacy 5(2) (March 2007) (Pubitemid 46527386)
    • (2007) IEEE Security and Privacy , vol.5 , Issue.2 , pp. 32-39
    • Willems, G.1    Holz, T.2    Freiling, F.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.