메뉴 건너뛰기




Volumn , Issue , 2010, Pages 413-425

Input generation via decomposition and re-stitching: Finding bugs in malware

Author keywords

Binary analysis; Composition; Input generation; Malware

Indexed keywords

BINARY ANALYSIS; COMPOSITION; DYNAMIC SYMBOLIC EXECUTIONS; ETHICAL CONSIDERATIONS; EXPLORATION TECHNIQUES; INPUT GENERATION; LITTLE RESEARCH; MALWARES; NETWORK ATTACKERS; SYMBOLIC EXECUTION;

EID: 78650029404     PISSN: 15437221     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1866307.1866354     Document Type: Conference Paper
Times cited : (48)

References (46)
  • 2
    • 85077688456 scopus 로고    scopus 로고
    • Towards automatic discovery of deviations in binary implementations with applications to error detection and fingerprint generation
    • Montreal, Quebec, Canada, Aug.
    • D. Brumley, J. Caballero, Z. Liang, J. Newsome, and D. Song. Towards automatic discovery of deviations in binary implementations with applications to error detection and fingerprint generation. In Proceedings of the 16th USENIX Security Symposium, pages 213-228, Montreal, Quebec, Canada, Aug. 2007.
    • (2007) Proceedings of the 16th USENIX Security Symposium , pp. 213-228
    • Brumley, D.1    Caballero, J.2    Liang, Z.3    Newsome, J.4    Song, D.5
  • 5
    • 76649114637 scopus 로고    scopus 로고
    • Towards generating high coverage vulnerability-based signatures with protocol-level constraint-guided exploration
    • RAID'09: Proceedings of the 12th International Symposium on Recent Advances in Intrusion Detection, Saint-Malo, France, Sept.
    • J. Caballero, Z. Liang, P. Poosankam, and D. Song. Towards generating high coverage vulnerability-based signatures with protocol-level constraint-guided exploration. In RAID'09: Proceedings of the 12th International Symposium on Recent Advances in Intrusion Detection, volume 5758 of Lecture Notes in Computer Science, Saint-Malo, France, Sept. 2009.
    • (2009) Lecture Notes in Computer Science , vol.5758
    • Caballero, J.1    Liang, Z.2    Poosankam, P.3    Song, D.4
  • 7
    • 26944472789 scopus 로고    scopus 로고
    • Execution generated test cases: How to make systems code crash itself
    • SPIN'05: Proceedings of the 12th International SPIN Workshop on Model Checking Software, San Francisco, California, USA, Aug.
    • C. Cadar and D. R. Engler. Execution generated test cases: How to make systems code crash itself. In SPIN'05: Proceedings of the 12th International SPIN Workshop on Model Checking Software, volume 3639 of Lecture Notes in Computer Science, pages 2-23, San Francisco, California, USA, Aug. 2005.
    • (2005) Lecture Notes in Computer Science , vol.3639 , pp. 2-23
    • Cadar, C.1    Engler, D.R.2
  • 8
    • 49949117136 scopus 로고    scopus 로고
    • On the limits of information flow techniques for malware analysis and containment
    • DIMVA'08: Proceedings of the Fifth Conference on Detection of Intrusions and Malware & Vulnerability Assessment, Paris, France, July
    • L. Cavallaro, P. Saxena, and R. Sekar. On the limits of information flow techniques for malware analysis and containment. In DIMVA'08: Proceedings of the Fifth Conference on Detection of Intrusions and Malware & Vulnerability Assessment, volume 5137 of Lecture Notes inComputer Science, pages 143-163, Paris, France, July 2008.
    • (2008) Lecture Notes InComputer Science , vol.5137 , pp. 143-163
    • Cavallaro, L.1    Saxena, P.2    Sekar, R.3
  • 12
    • 38049098390 scopus 로고    scopus 로고
    • Inversion attacks on secure hash functions using SAT solvers
    • SAT'07: Proceedings of the Tenth International Conference on Theory and Applications of Satisfiability Testing, Lisbon, Portugal
    • D. De, A. Kumarasubramanian, and R. Venkatesan. Inversion attacks on secure hash functions using SAT solvers. In SAT'07: Proceedings of the Tenth International Conference on Theory and Applications of Satisfiability Testing, volume 4501 of Lecture Notes in Computer Science, pages 377-382, Lisbon, Portugal, 2007.
    • (2007) Lecture Notes in Computer Science , vol.4501 , pp. 377-382
    • De, D.1    Kumarasubramanian, A.2    Venkatesan, R.3
  • 14
  • 16
    • 38149088089 scopus 로고    scopus 로고
    • A decision procedure for bit-vectors and arrays
    • CAV'07: Proceedings of the 19th International Conference on Computer Aided Verification, Berlin, Germany, July
    • V. Ganesh and D. L. Dill. A decision procedure for bit-vectors and arrays. In CAV'07: Proceedings of the 19th International Conference on Computer Aided Verification, volume 4590 of Lecture Notes in Computer Science, pages 519-531, Berlin, Germany, July 2007.
    • (2007) Lecture Notes in Computer Science , vol.4590 , pp. 519-531
    • Ganesh, V.1    Dill, D.L.2
  • 24
    • 0016971687 scopus 로고
    • Symbolic execution and program testing
    • J. C. King. Symbolic execution and program testing. Communications of the ACM, 19(7):385-394, 1976.
    • (1976) Communications of the ACM , vol.19 , Issue.7 , pp. 385-394
    • King, J.C.1
  • 26
    • 78650034031 scopus 로고    scopus 로고
    • Monster botnet held 800,000 people's details
    • Mar.
    • J. Leyden. Monster botnet held 800,000 people's details. The Register, Mar. 2010. http://www.theregister.co.uk/2010/03/04/mariposa-police-hunt-more- botherders/.
    • (2010) The Register
    • Leyden, J.1
  • 30
    • 0025557712 scopus 로고
    • An empirical study of the reliability of unix utilities
    • B. P. Miller, L. Fredriksen, and B. So. An empirical study of the reliability of unix utilities. Communications of the ACM, 33(12):32-44, 1990.
    • (1990) Communications of the ACM , vol.33 , Issue.12 , pp. 32-44
    • Miller, B.P.1    Fredriksen, L.2    So, B.3
  • 31
    • 84893320590 scopus 로고    scopus 로고
    • Dynamic test generation to find integer bugs in x86 binary Linux programs
    • Montreal, Quebec, Canada, Aug.
    • D. Molnar, X. C. Li, and D. Wagner. Dynamic test generation to find integer bugs in x86 binary Linux programs. In Proceedings of the 18th USENIX Security Symposium, pages 67-81, Montreal, Quebec, Canada, Aug. 2009.
    • (2009) Proceedings of the 18th USENIX Security Symposium , pp. 67-81
    • Molnar, D.1    Li, X.C.2    Wagner, D.3
  • 40
    • 78650001233 scopus 로고    scopus 로고
    • Shmoo-fu: Hacker goo, goofs, and gear with the shmoo
    • Las Vegas, Nevada, USA, July
    • B. Potter, Beetle, CowboyM, D. Moniz, R. Thayer, 3ricj, and Pablos. Shmoo-fu: Hacker goo, goofs, and gear with the shmoo. In DEFCON, Las Vegas, Nevada, USA, July 2005. http://www.defcon.org/images/defcon-13/dc13- presentations/dc-13-beetle-shmoo-fu.pdf.
    • (2005) DEFCON
    • Potter, B.1    Cowboym, B.2    Moniz, D.3    Thayer, R.4    Pablos5
  • 41
    • 78650021055 scopus 로고    scopus 로고
    • Shadowserver foundation. http://www.shadowserver.org/.
  • 42
    • 58449129985 scopus 로고    scopus 로고
    • BitBlaze: A new approach to computer security via binary analysis (keynote invited paper)
    • ICISS'08: Proceedings of the 4th International Conference on Information Systems Security, Hyderabad, India, Dec.
    • D. Song, D. Brumley, H. Yin, J. Caballero, I. Jager, M. G. Kang, Z. Liang, J. Newsome, P. Poosankam, and P. Saxena. BitBlaze: A new approach to computer security via binary analysis (keynote invited paper). In ICISS'08: Proceedings of the 4th International Conference on Information Systems Security, volume 5352 of Lecture Notes in Computer Science, pages 1-25, Hyderabad, India, Dec. 2008.
    • (2008) Lecture Notes in Computer Science , vol.5352 , pp. 1-25
    • Song, D.1    Brumley, D.2    Yin, H.3    Caballero, J.4    Jager, I.5    Kang, M.G.6    Liang, Z.7    Newsome, J.8    Poosankam, P.9    Saxena, P.10
  • 43
    • 77955183968 scopus 로고    scopus 로고
    • TaintScope: A checksum-aware directed fuzzing tool for automatic software vulnerability detection
    • Oakland, California, USA, May
    • T. Wang, T. Wei, G. Gu, and W. Zou. TaintScope: A checksum-aware directed fuzzing tool for automatic software vulnerability detection. In SP'10: Proceedings of the 31st IEEE Symposium on Security and Privacy, Oakland, California, USA, May 2010.
    • (2010) SP'10: Proceedings of the 31st IEEE Symposium on Security and Privacy
    • Wang, T.1    Wei, T.2    Gu, G.3    Zou, W.4
  • 44
    • 70350399651 scopus 로고    scopus 로고
    • ReFormat: Automatic reverse engineering of encrypted messages
    • ESORICS'09: 14th European Symposium on Research in Computer Security, Saint-Malo, France, Sept.
    • Z. Wang, X. Jiang, W. Cui, X. Wang, and M. Grace. ReFormat: Automatic reverse engineering of encrypted messages. In ESORICS'09: 14th European Symposium on Research in Computer Security, volume 5789 of Lecture Notes in Computer Science, pages 200-215, Saint-Malo, France, Sept. 2009.
    • (2009) Lecture Notes in Computer Science , vol.5789 , pp. 200-215
    • Wang, Z.1    Jiang, X.2    Cui, W.3    Wang, X.4    Grace, M.5
  • 46
    • 78649983597 scopus 로고    scopus 로고
    • The zlib library. http://www.zlib.net/.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.