메뉴 건너뛰기




Volumn 6418 LNCS, Issue , 2010, Pages 168-182

Behavior abstraction in malware analysis

Author keywords

behavior abstraction; behavioral detection; dynamic binary instrumentation; finite state automaton; formal language; Malware; string rewriting; trace

Indexed keywords

BEHAVIOR ABSTRACTION; BEHAVIORAL DETECTION; DYNAMIC BINARY INSTRUMENTATION; FINITE STATE AUTOMATA; MALWARES; STRING REWRITING; TRACE; CODE INSTRUMENTATION; EXPRESSIVE POWER; MALICIOUS BEHAVIOR; MALWARE DETECTION;

EID: 78650082281     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-16612-9_14     Document Type: Conference Paper
Times cited : (21)

References (22)
  • 1
    • 78650160624 scopus 로고    scopus 로고
    • DynamoRIO, http://dynamorio.org
  • 2
    • 78650130671 scopus 로고    scopus 로고
    • OpenFST, http://www.openfst.org/
  • 3
    • 78650083692 scopus 로고    scopus 로고
    • Pin, http://www.pintool.org
  • 9
    • 33746406796 scopus 로고    scopus 로고
    • Detecting self-mutating malware using control-flow graph matching
    • Büschkes, R., Laskov, P. (eds.) DIMVA 2006. Springer, Heidelberg
    • Bruschi, D., Martignoni, L., Monga, M.: Detecting self-mutating malware using control-flow graph matching. In: Büschkes, R., Laskov, P. (eds.) DIMVA 2006. LNCS, vol. 4064, pp. 129-143. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.4064 , pp. 129-143
    • Bruschi, D.1    Martignoni, L.2    Monga, M.3
  • 11
    • 0023294949 scopus 로고
    • Computer viruses: Theory and experiments
    • Cohen, F.: Computer viruses: Theory and experiments. Computers and Security 6(1), 22-35 (1987)
    • (1987) Computers and Security , vol.6 , Issue.1 , pp. 22-35
    • Cohen, F.1
  • 13
    • 0042542175 scopus 로고    scopus 로고
    • A uniform framework for problems on context-free grammars
    • Esparza, J., Rossmanith, P., Schwoon, S.: A uniform framework for problems on context-free grammars. Bulletin of the EATCS 72, 169-177 (2000)
    • (2000) Bulletin of the EATCS , vol.72 , pp. 169-177
    • Esparza, J.1    Rossmanith, P.2    Schwoon, S.3
  • 16
    • 76649135461 scopus 로고    scopus 로고
    • Malware behavioral detection by attributeautomata using abstraction from platform and language
    • Balzarotti, D. (ed.) RAID 2009. Springer, Heidelberg
    • Jacob, G., Debar, H., Filiol, E.: Malware behavioral detection by attributeautomata using abstraction from platform and language. In: Balzarotti, D. (ed.) RAID 2009. LNCS, vol. 5758, pp. 81-100. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5758 , pp. 81-100
    • Jacob, G.1    Debar, H.2    Filiol, E.3
  • 17
    • 26444526878 scopus 로고    scopus 로고
    • Detecting malicious code by model checking
    • Julisch, K., Krügel, C. (eds.) DIMVA 2005. Springer, Heidelberg
    • Kinder, J., Katzenbeisser, S., Schallhart, C., Veith, H.: Detecting malicious code by model checking. In: Julisch, K., Krügel, C. (eds.) DIMVA 2005. LNCS, vol. 3548, pp. 174-187. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3548 , pp. 174-187
    • Kinder, J.1    Katzenbeisser, S.2    Schallhart, C.3    Veith, H.4
  • 18
    • 48349119837 scopus 로고
    • Dynamic detection and classification of computer viruses using general behaviour patterns
    • Le Charlier, B., Mounji, A., Swimmer, M.: Dynamic detection and classification of computer viruses using general behaviour patterns. In: International Virus Bulletin Conference, pp. 1-22 (1995)
    • (1995) International Virus Bulletin Conference , pp. 1-22
    • Le Charlier, B.1    Mounji, A.2    Swimmer, M.3
  • 19
    • 56549121841 scopus 로고    scopus 로고
    • A layered architecture for detecting malicious behaviors
    • Lippmann, R., Kirda, E., Trachtenberg, A. (eds.) RAID 2008. Springer, Heidelberg
    • Martignoni, L., Stinson, E., Fredrikson, M., Jha, S., Mitchell, J.C.: A layered architecture for detecting malicious behaviors. In: Lippmann, R., Kirda, E., Trachtenberg, A. (eds.) RAID 2008. LNCS, vol. 5230, pp. 78-97. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.5230 , pp. 78-97
    • Martignoni, L.1    Stinson, E.2    Fredrikson, M.3    Jha, S.4    Mitchell, J.C.5
  • 20
    • 34548737161 scopus 로고    scopus 로고
    • Exploring multiple execution paths for malware analysis
    • IEEE Computer Society, Los Alamitos
    • Moser, A., Kruegel, C., Kirda, E.: Exploring multiple execution paths for malware analysis. In: IEEE Symposium on Security and Privacy, pp. 231-245. IEEE Computer Society, Los Alamitos (2007)
    • (2007) IEEE Symposium on Security and Privacy , pp. 231-245
    • Moser, A.1    Kruegel, C.2    Kirda, E.3
  • 21
    • 0034829697 scopus 로고    scopus 로고
    • A fast automaton-based method for detecting anomalous program behaviors
    • IEEE Computer Society, Los Alamitos
    • Sekar, R., Bendre, M., Dhurjati, D., Bollineni, P.: A fast automaton-based method for detecting anomalous program behaviors. In: IEEE Symposium on Security and Privacy, pp. 144-155. IEEE Computer Society, Los Alamitos (2001)
    • (2001) IEEE Symposium on Security and Privacy , pp. 144-155
    • Sekar, R.1    Bendre, M.2    Dhurjati, D.3    Bollineni, P.4
  • 22
    • 84946414079 scopus 로고    scopus 로고
    • Static verification of worm and virus behavior in binary executables using model checking
    • IEEE Press, Los Alamitos
    • Singh, P.K., Lakhotia, A.: Static verification of worm and virus behavior in binary executables using model checking. In: Information Assurance Workshop, pp. 298-300. IEEE Press, Los Alamitos (2003)
    • (2003) Information Assurance Workshop , pp. 298-300
    • Singh, P.K.1    Lakhotia, A.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.