메뉴 건너뛰기




Volumn , Issue , 2011, Pages 285-296

The power of procrastination: Detection and mitigation of execution-stalling malicious code

Author keywords

Emulation; Evasion; Malware analysis

Indexed keywords

ANTI-MALWARE; DEFENSE MECHANISM; EMULATION; EVASION; MALICIOUS ACTIVITIES; MALICIOUS BEHAVIOR; MALICIOUS CODES; MALWARE ANALYSIS; MALWARES; SECURITY PROBLEMS;

EID: 80755168350     PISSN: 15437221     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2046707.2046740     Document Type: Conference Paper
Times cited : (78)

References (28)
  • 2
    • 80755188399 scopus 로고    scopus 로고
    • http://anubis.iseclab.org, 2010.
    • (2010)
  • 3
    • 80755188401 scopus 로고    scopus 로고
    • http://www.cwsandbox.org, 2010.
    • (2010)
  • 4
    • 80755174271 scopus 로고    scopus 로고
    • http://www.norman.com/enterprise/all-products/malware-analyzer/ norman-sandbox-analyzer/en, 2010.
    • (2010)
  • 5
    • 80755188400 scopus 로고    scopus 로고
    • http://msdn.microsoft.com/en-us/library/ms724408%28VS.85%29.aspx, 2010.
    • (2010)
  • 22
    • 85084163236 scopus 로고    scopus 로고
    • A fistful of red-pills: How to automatically generate procedures to detect CPU emulators
    • PALEARI, R., MARTIGNONI, L., ROGLIA, G. F., AND BRUSCHI, D. A Fistful of Red-Pills: How to Automatically Generate Procedures to Detect CPU Emulators. In usenix-woot (2009).
    • (2009) Usenix-woot
    • Paleari, R.1    Martignoni, L.2    Roglia, G.F.3    Bruschi, D.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.