메뉴 건너뛰기




Volumn , Issue , 2010, Pages 52-59

Towards understanding malware behaviour by the extraction of API calls

Author keywords

API calls; Code obfuscation; Feature extraction; Malware

Indexed keywords

ANTI VIRUS; API CALLS; API FUNCTION CALLS; ASSEMBLY LANGUAGE; AUTOMATED METHODS; AUTOMATED SYSTEMS; CODE OBFUSCATION; CURRENT DETECTION; DEEP KNOWLEDGE; EXECUTABLES; LABOUR-INTENSIVE; MALWARE DETECTION; MALWARES; PACKED EXECUTABLES; RECENT TRENDS; SOFTWARE TOOL;

EID: 78649888272     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CTC.2010.8     Document Type: Conference Paper
Times cited : (135)

References (37)
  • 1
    • 0034269416 scopus 로고    scopus 로고
    • Attacking malicious code: A report to the infosec research council
    • G. McGraw and G. Morrisett, "Attacking malicious code: A report to the infosec research council", IEEE Software, 2000, 17(5), 33-44.
    • (2000) IEEE Software , vol.17 , Issue.5 , pp. 33-44
    • McGraw, G.1    Morrisett, G.2
  • 3
    • 79952060600 scopus 로고    scopus 로고
    • Survey on Malware detection methods
    • Vinod, P.; Jaipur, R.; Laxmi, V. & Gaur, M., "Survey on Malware Detection Methods", Hack. 2009, 74.
    • (2009) Hack , pp. 74
    • Vinod, P.1    Jaipur, R.2    Laxmi, V.3    Gaur, M.4
  • 13
    • 67650701354 scopus 로고    scopus 로고
    • Malware detection based on suspicious behavior identification
    • International Workshop on, IEEE Computer Society
    • Wang, C.; Pang, J.; Zhao, R.; Fu, W. & Liu, X., "Malware Detection Based on Suspicious Behavior Identification", Education Technology and Computer Science, International Workshop on, IEEE Computer Society, 2009, 2, 198-202.
    • (2009) Education Technology and Computer Science , vol.2 , pp. 198-202
    • Wang, C.1    Pang, J.2    Zhao, R.3    Fu, W.4    Liu, X.5
  • 16
    • 78649836245 scopus 로고    scopus 로고
    • Malware Research and Response at Microsoft.pdf, August
    • Microsoft, 2007, "Understanding Anti-Malware Technologies", http://download.microsoft.com/download/0/c/0/0c040c8f-2109-4760-a750- 96443fd14ef2/Understanding Malware Research and Response at Microsoft.pdf, August 2009.
    • (2007) Understanding Anti-Malware Technologies
  • 17
    • 33746406796 scopus 로고    scopus 로고
    • Detecting self-mutating Malware using control-flow graph matching
    • Springer
    • Bruschi, D.; Martignoni, L. & Monga, M., "Detecting self-mutating malware using control-flow graph matching", Lecture Notes in Computer Science, Springer, 2006, 4064, 129.
    • (2006) Lecture Notes in Computer Science , vol.4064 , pp. 129
    • Bruschi, D.1    Martignoni, L.2    Monga, M.3
  • 18
    • 78649876233 scopus 로고    scopus 로고
    • MetaPHOR August
    • MetaPHOR, http://securityresponse.symantec.com/avcenter/venc/data/w32. simile.html, August 2009.
    • (2009)
  • 21
    • 84871400671 scopus 로고    scopus 로고
    • Trends for january 06 - june 06. X
    • Turner, D. Semantic internet security threat report: Trends for january 06 - june 06. X. http://eval.symantec.com/mktginfo/enterprise/white-papers/ent- whitepaper-symantec-internet-security-threat-report-x-09-2006.en-us.pdf. 2006.
    • (2006) Semantic Internet Security Threat Report
    • Turner, D.1
  • 22
    • 78649898800 scopus 로고    scopus 로고
    • NEOx March
    • NEOx, PE Tools, http://www.uinc.ru, March 2010.
    • (2010) PE Tools
  • 27
    • 78649832908 scopus 로고    scopus 로고
    • Snaker, Qwerton, Jibz & xineohP
    • Snaker, Qwerton, Jibz & xineohP, PEiD, http://www.peid.info/, 2008.
    • (2008)
  • 30
    • 78649878795 scopus 로고    scopus 로고
    • February
    • SQLite, www.sqlite.org/, February 2010.
    • (2010)
  • 31
    • 78649845887 scopus 로고    scopus 로고
    • Windows API Functions January
    • Windows API Functions, MSDN, http://msdn.microsoft.com/en-us/library/ aa383749%28VS.85%29.aspx. January 2010.
    • (2010)
  • 32
    • 78649863905 scopus 로고    scopus 로고
    • Investigation techniques for static analysis of NTFS file system images
    • Internet Security, University of Ballarat
    • Alazab, M., "Investigation techniques for static analysis of NTFS file system images", 2009 Annual Research Conference, Internet Security, University of Ballarat.
    • 2009 Annual Research Conference
    • Alazab, M.1
  • 33
    • 45849099815 scopus 로고    scopus 로고
    • Forensic artifacts of microsoft windows vista system
    • Springer
    • Purcell, D. & Lang, S., "Forensic Artifacts of Microsoft Windows Vista System", Lecture Notes in Computer Science, Springer, 2008, 5075, 304-319.
    • (2008) Lecture Notes in Computer Science , vol.5075 , pp. 304-319
    • Purcell, D.1    Lang, S.2
  • 35
    • 63149135419 scopus 로고    scopus 로고
    • A static API birthmark for windows binary executables
    • Elsevier
    • Choi, S.; Park, H.; Lim, H. & Han, T., "A static API birthmark for Windows binary executables", Journal of Systems and Software, Elsevier, 2009, 82, 862-873.
    • (2009) Journal of Systems and Software , vol.82 , pp. 862-873
    • Choi, S.1    Park, H.2    Lim, H.3    Han, T.4
  • 36
    • 84882697421 scopus 로고    scopus 로고
    • Towards stealthy Malware detection
    • Springer
    • Stolfo, S.; Wang, K. & Li, W., "Towards Stealthy Malware Detection", Malware Detection, Springer, 2007, 27, 231-249.
    • (2007) Malware Detection , vol.27 , pp. 231-249
    • Stolfo, S.1    Wang, K.2    Li, W.3
  • 37
    • 58149103803 scopus 로고    scopus 로고
    • An automatic anti-anti-VMware technique applicable for multi-stage packed Malware
    • MALWARE 2008. 3rd International Conference on
    • Sun, L.; Ebringer, T. & Boztas, S., "An automatic anti-anti-VMware technique applicable for multi-stage packed malware", Malicious and Unwanted Software, 2008. MALWARE 2008. 3rd International Conference on, 2008, 17-23.
    • (2008) Malicious and Unwanted Software, 2008 , pp. 17-23
    • Sun, L.1    Ebringer, T.2    Boztas, S.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.