메뉴 건너뛰기




Volumn , Issue , 2010, Pages 399-412

AccessMiner: Using system-centric models for malware protection

Author keywords

Anomaly based detector; Malware; System Call

Indexed keywords

ANALYSIS APPROACH; ANOMALY-BASED DETECTOR; BENIGN PROCESS; COMPUTING INFRASTRUCTURES; DETECTION MODELS; FALSE POSITIVE; FALSE POSITIVE RATES; INTRUSION DETECTION SYSTEMS; MALICIOUS CODES; MALWARES; OPERATING SYSTEMS; REAL-WORLD APPLICATION; RUNTIMES; SECURITY THREATS; SYSTEM CALLS; SYSTEM-CALL SEQUENCE;

EID: 78650024495     PISSN: 15437221     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1866307.1866353     Document Type: Conference Paper
Times cited : (158)

References (30)
  • 1
    • 78650035986 scopus 로고    scopus 로고
    • Anubis. http://anubis.seclab.tuwien.ac.at. 2008.
    • (2008)
  • 2
    • 38149089416 scopus 로고    scopus 로고
    • Automated classification and analysis of internet malware
    • C. Kruegel, R. Lippmann, and A. Clark, editors, Proceedings of the 10th International Symposium on Recent Advances in Intrusion Detection (RAID'07), Gold Goast, Australia, Sept. Springer-Verlag
    • M. Bailey, J. Oberheide, J. Andersen, Z. M. Mao, F. Jahanian, and J. Nazario. Automated classification and analysis of internet malware. In C. Kruegel, R. Lippmann, and A. Clark, editors, Proceedings of the 10th International Symposium on Recent Advances in Intrusion Detection (RAID'07), volume 4637 of Lecture Notes in Computer Science, pages 178-197, Gold Goast, Australia, Sept. 2007. Springer-Verlag.
    • (2007) Lecture Notes in Computer Science , vol.4637 , pp. 178-197
    • Bailey, M.1    Oberheide, J.2    Andersen, J.3    Mao, Z.M.4    Jahanian, F.5    Nazario, J.6
  • 4
    • 33746406796 scopus 로고    scopus 로고
    • Detecting self-mutating malware using control-flow graph matching
    • R. Büschkes and P. Laskov, editors, Proceedings of the 3rd Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA'06). Springer-Verlag
    • D. Bruschi, L. Martignoni, and M. Monga. Detecting self-mutating malware using control-flow graph matching. In R. Büschkes and P. Laskov, editors, Proceedings of the 3rd Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA'06), volume 4064 of Lecture Notes in Computer Science, pages 129-143. Springer-Verlag, 2006.
    • (2006) Lecture Notes in Computer Science , vol.4064 , pp. 129-143
    • Bruschi, D.1    Martignoni, L.2    Monga, M.3
  • 17
    • 33745670395 scopus 로고    scopus 로고
    • Polymorphic worm detection using structural information of executables
    • Proceedings of the 8th International Symposium on Recent Advances in Intrusion Detection (RAID'05), Seattle, WA, September. Springer-Verlag
    • C. Kruegel, E. Kirda, D. Mutz, W. Robertson, and G. Vigna. Polymorphic Worm Detection Using Structural Information of Executables. In Proceedings of the 8th International Symposium on Recent Advances in Intrusion Detection (RAID'05), volume 3858 of LNCS, pages 207-226, Seattle, WA, September 2005. Springer-Verlag.
    • (2005) LNCS , vol.3858 , pp. 207-226
    • Kruegel, C.1    Kirda, E.2    Mutz, D.3    Robertson, W.4    Vigna, G.5
  • 23
    • 49949090311 scopus 로고    scopus 로고
    • Learning and classification of malware behavior
    • D. Zamboni, editor, Proceedings of the 5th Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA'08). Springer-Verlag
    • K. Rieck, T. Holz, C. Willems, P. Düssel1, and P. Laskov. Learning and classification of malware behavior. In D. Zamboni, editor, Proceedings of the 5th Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA'08), volume 5137 of Lecture Notes in Computer Science, pages 108-125. Springer-Verlag, 2008.
    • (2008) Lecture Notes in Computer Science , vol.5137 , pp. 108-125
    • Rieck, K.1    Holz, T.2    Willems, C.3    Düssell, P.4    Laskov, P.5
  • 26
    • 37849037807 scopus 로고    scopus 로고
    • Characterizing bots remote control behavior
    • C. Kruegel, R. Lippmann and A. Clark, editors, Proceedings of the 10th International Symposium on Recent Advances in Intrusion Detection (RAID'07). Springer-Verlag
    • E. Stinson and J. C. Mitchell. Characterizing bots remote control behavior. In C. Kruegel, R. Lippmann and A. Clark, editors, Proceedings of the 10th International Symposium on Recent Advances in Intrusion Detection (RAID'07), volume 4637 of Lecture Notes in Computer Science. Springer-Verlag, 2007.
    • (2007) Lecture Notes in Computer Science , vol.4637
    • Stinson, E.1    Mitchell, J.C.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.