메뉴 건너뛰기




Volumn 10, Issue 5, 2011, Pages 269-283

SAS: Semantics aware signature generation for polymorphic worm detection

Author keywords

Data flow analysis; Hidden Markov model; Machine learning; Semantics; Worm signature generation

Indexed keywords

ADVERSARIAL ENVIRONMENTS; DATA FLOW; MACHINE-LEARNING; MATCHING TECHNIQUES; NOISE INJECTION; NOISY PACKETS; POLYMORPHIC WORMS; SEMANTIC ANALYSIS; SIGNATURE GENERATION; STATISTICAL ALGORITHM; WORM DETECTION; WORM SIGNATURES;

EID: 80052922553     PISSN: 16155262     EISSN: 16155270     Source Type: Journal    
DOI: 10.1007/s10207-011-0132-7     Document Type: Article
Times cited : (8)

References (41)
  • 6
    • 85077688456 scopus 로고    scopus 로고
    • Towards automatic discovery of deviations in binary implementations with applications to error detection and fingerprint generation
    • Brumley, D., Caballero, J., Liang, Z., Newsome, J., Song, D.: Towards automatic discovery of deviations in binary implementations with applications to error detection and fingerprint generation. In: Proceedings of the 16th USENIX Security (2007).
    • (2007) Proceedings of the 16th USENIX Security
    • Brumley, D.1    Caballero, J.2    Liang, Z.3    Newsome, J.4    Song, D.5
  • 8
    • 38149123929 scopus 로고    scopus 로고
    • Advanced allergy attacks: Does a corpus really help
    • Springer, Berlin
    • Chung, S. P., Mok, A. K.: Advanced allergy attacks: Does a corpus really help. In: Recent Advances in Intrusion Detection (RAID), pp. 236-255. Springer, Berlin (2007).
    • (2007) Recent Advances In Intrusion Detection (RAID) , pp. 236-255
    • Chung, S.P.1    Mok, A.K.2
  • 12
    • 80052960056 scopus 로고    scopus 로고
    • Mtpa-a processor architecture for mp-socs employing the moving threads paradigm
    • Forsell, M., Leppänen, V.: Mtpa-a processor architecture for mp-socs employing the moving threads paradigm. In: PDPTA, pp. 198-204 (2009).
    • (2009) PDPTA , pp. 198-204
    • Forsell, M.1    Leppänen, V.2
  • 15
    • 33846309686 scopus 로고    scopus 로고
    • e-nexsh: Achieving an effectively non-executable stack and heap via system-call policing
    • Kc, G. S., Keromytis, A. D.: e-nexsh: achieving an effectively non-executable stack and heap via system-call policing. In: ACSAC, pp. 286-302 (2005).
    • (2005) ACSAC , pp. 286-302
    • Kc, G.S.1    Keromytis, A.D.2
  • 29
    • 33750332606 scopus 로고    scopus 로고
    • Paragraph: Thwarting signature learning by training maliciously
    • Springer, Berlin
    • Newsome, J., Karp, B., Song, D.: Paragraph: thwarting signature learning by training maliciously. In: Recent Advances in Intrusion Detection (RAID), pp. 81-105. Springer, Berlin (2006).
    • (2006) Recent Advances In Intrusion Detection (RAID) , pp. 81-105
    • Newsome, J.1    Karp, B.2    Song, D.3
  • 30
    • 79953672829 scopus 로고    scopus 로고
    • Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software
    • Newsome, J., Song, D.: Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software. In: Proceedings of Network and Distributed System Security Symposium (2005).
    • (2005) Proceedings of Network and Distributed System Security Symposium
    • Newsome, J.1    Song, D.2
  • 33
    • 0024610919 scopus 로고    scopus 로고
    • A tutorial on hidden markov models and selected applications in speech recognition
    • Rabiner L. R.: A tutorial on hidden markov models and selected applications in speech recognition. Proceedings of the IEEE 77(2), 257-286 (1999).
    • (1999) Proceedings of the IEEE , vol.77 , Issue.2 , pp. 257-286
    • Rabiner, L.R.1
  • 34
    • 80052954590 scopus 로고    scopus 로고
    • Ray, E.: Ms-sql worm. http://www. sans. org/resources/malwarefaq/ms-sql-exploit. php.
    • Ms-sql Worm
    • Ray, E.1
  • 36
    • 33845453072 scopus 로고    scopus 로고
    • Dira: Automatic detection, identification and repair of control-hijacking attacks
    • Smirnov, A., cker Chiueh, T.: Dira: Automatic detection, identification and repair of control-hijacking attacks. In: NDSS (2005).
    • (2005) NDSS
    • Smirnov, A.1    cker Chiueh, T.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.