메뉴 건너뛰기




Volumn 6806 LNCS, Issue , 2011, Pages 116-131

Malware analysis with tree automata inference

Author keywords

[No Author keywords available]

Indexed keywords

DATAFLOW; DEPENDENCY GRAPHS; DETECTION METHODS; MALWARE ANALYSIS; MALWARE DETECTION; MALWARES; SECURITY COMMUNITY; SIGNATURE DETECTION; SOURCE CODES; SYNTACTIC PATTERNS; SYSTEM CALLS; TREE AUTOMATA;

EID: 79960360109     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-22110-1_10     Document Type: Conference Paper
Times cited : (46)

References (35)
  • 11
    • 21644482450 scopus 로고    scopus 로고
    • Minos: Control data attack prevention orthogonal to memory model
    • IEEE Computer Society Press, Los Alamitos
    • Crandall, J., Chong, F.: Minos: Control data attack prevention orthogonal to memory model. In: the Proc. of the 37th Int. Symp. on Microarchitecture, pp. 221-232. IEEE Computer Society Press, Los Alamitos (2005)
    • (2005) The Proc. of the 37th Int. Symp. on Microarchitecture , pp. 221-232
    • Crandall, J.1    Chong, F.2
  • 14
    • 0006776326 scopus 로고
    • Tech. rep. In: Dept. Syst. Inform. Comput. Univ. Politecnica Valencia, Spain
    • García, P.: Learning k-testable tree sets from positive data. Tech. rep. In: Dept. Syst. Inform. Comput. Univ. Politecnica Valencia, Spain (1993)
    • (1993) Learning K-testable Tree Sets from Positive Data
    • García, P.1
  • 15
    • 0025484018 scopus 로고
    • Inference of k-testable languages in the strict sense and application to syntactic pattern recognition
    • García, P., Vidal, E.: Inference of k-testable languages in the strict sense and application to syntactic pattern recognition. IEEE Trans. Pattern Anal. Mach. Intell. 12, 920-925 (1990)
    • (1990) IEEE Trans. Pattern Anal. Mach. Intell. , vol.12 , pp. 920-925
    • García, P.1    Vidal, E.2
  • 17
    • 0001187706 scopus 로고
    • Complexity of automaton identification from given data
    • Gold, E.M.: Complexity of automaton identification from given data. Information and Control 37(3), 302-320 (1978)
    • (1978) Information and Control , vol.37 , Issue.3 , pp. 302-320
    • Gold, E.M.1
  • 18
    • 38449121202 scopus 로고    scopus 로고
    • Using verification technology to specify and detect malware
    • Moreno Díaz, R., Pichler, F., Quesada Arencibia, A. (eds.) EUROCAST 2007. Springer, Heidelberg
    • Holzer, A., Kinder, J., Veith, H.: Using verification technology to specify and detect malware. In: Moreno Díaz, R., Pichler, F., Quesada Arencibia, A. (eds.) EUROCAST 2007. LNCS, vol. 4739, pp. 497-504. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4739 , pp. 497-504
    • Holzer, A.1    Kinder, J.2    Veith, H.3
  • 21
    • 0016971687 scopus 로고
    • Symbolic execution and program testing
    • King, J.C.: Symbolic execution and program testing. Comm. of the ACM 19(7), 385-394 (1976)
    • (1976) Comm. of the ACM , vol.19 , Issue.7 , pp. 385-394
    • King, J.C.1
  • 28
    • 34548737161 scopus 로고    scopus 로고
    • Exploring multiple execution paths for malware analysis
    • IEEE Computer Society Press, Los Alamitos
    • Moser, A., Kruegel, C., Kirda, E.: Exploring multiple execution paths for malware analysis. In: SP 2007: Proc. of the IEEE Symp. on Security and Privacy, pp. 231-245. IEEE Computer Society Press, Los Alamitos (2007)
    • (2007) SP 2007: Proc. of the IEEE Symp. on Security and Privacy , pp. 231-245
    • Moser, A.1    Kruegel, C.2    Kirda, E.3
  • 29
    • 27544444280 scopus 로고    scopus 로고
    • Dynamic Taint Analysis: Automatic Detection, Analysis, and Signature Generation of Exploit Attacks on Commodity Software
    • Newsome, J., Song, D.: Dynamic Taint Analysis: Automatic Detection, Analysis, and Signature Generation of Exploit Attacks on Commodity Software. In: Proc. of the Network and Distributed Systems Security Symp. (2005)
    • Proc. of the Network and Distributed Systems Security Symp. (2005)
    • Newsome, J.1    Song, D.2
  • 30
    • 12844267418 scopus 로고    scopus 로고
    • Secure program execution via dynamic information flow tracking
    • Suh, G., Lee, J., Zhang, D., Devadas, S.: Secure program execution via dynamic information flow tracking. ACM SIGOPS Operating Systems Review 38(5), 85-96 (2004)
    • (2004) ACM SIGOPS Operating Systems Review , vol.38 , Issue.5 , pp. 85-96
    • Suh, G.1    Lee, J.2    Zhang, D.3    Devadas, S.4
  • 32
    • 0034836394 scopus 로고    scopus 로고
    • Intrusion detection via static analysis
    • IEEE Computer Society Press, Los Alamitos
    • Wagner, D., Dean, D.: Intrusion detection via static analysis. In: Proc. of the IEEE Symp. on Security and Privacy, p. 156. IEEE Computer Society Press, Los Alamitos (2001)
    • (2001) Proc. of the IEEE Symp. on Security and Privacy , pp. 156
    • Wagner, D.1    Dean, D.2
  • 33
  • 35
    • 0012883458 scopus 로고
    • Locally testable languages
    • Zalcstein, Y.: Locally testable languages. J. Comput. Syst. Sci. 6(2), 151-167 (1972)
    • (1972) J. Comput. Syst. Sci. , vol.6 , Issue.2 , pp. 151-167
    • Zalcstein, Y.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.