메뉴 건너뛰기




Volumn , Issue , 2011, Pages 149-154

Mechanisms of polymorphic and metamorphic viruses

Author keywords

Decyptor and encryptor; Garbage; Metamorphism; Obfuscation; Permutation; Polymorphism; Structure

Indexed keywords

DECYPTOR AND ENCRYPTOR; GARBAGE; METAMORPHISM; OBFUSCATION; PERMUTATION;

EID: 81255167363     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/EISIC.2011.77     Document Type: Conference Paper
Times cited : (23)

References (28)
  • 1
    • 81255197872 scopus 로고    scopus 로고
    • Information Technology Security Report Lead Agency Publication R2-002
    • Information Technology Security Report Lead Agency Publication R2-002, Future Trends in Malicious Code - 2006 Report.
    • Future Trends in Malicious Code - 2006 Report
  • 2
    • 81255211620 scopus 로고    scopus 로고
    • McAfee, Virtually Here: The Age of Cyber Warfare, McAfee, Inc
    • McAfee. McAfee virtual criminology report, Virtually Here: The Age of Cyber Warfare, McAfee, Inc, 2009.
    • (2009) McAfee Virtual Criminology Report
  • 3
    • 21644469120 scopus 로고    scopus 로고
    • An undetectable computer virus
    • Sep, IBM Thomas J Watson Research Center, Hawthorne, New York, USA
    • David M. Chess and Steve R. White, An Undetectable Computer Virus, Virus Bulletin Conference, Sep 2000, IBM Thomas J. Watson Research Center, Hawthorne, New York, USA.
    • (2000) Virus Bulletin Conference
    • Chess, D.M.1    White, S.R.2
  • 5
    • 34047129159 scopus 로고    scopus 로고
    • Using entropy analysis to find encrypted and packed malware
    • DOI 10.1109/MSP.2007.48
    • Robert Lyda and Jim Hamrock, Using Entropy Analysis to Find Encrypted and Packed Malware, IEEE Security & Privacy, vol 5, pp. 40-45, 2007. (Pubitemid 46527387)
    • (2007) IEEE Security and Privacy , vol.5 , Issue.2 , pp. 40-45
    • Lyda, R.1    Hamrock, J.2
  • 6
    • 81255177016 scopus 로고    scopus 로고
    • Defeating polymorphism beyond emulation
    • October
    • Adrian E. Stepan, Defeating Polymorphism beyond Emulation, Virus Bulletin Conference, October 2005.
    • (2005) Virus Bulletin Conference
    • Stepan, A.E.1
  • 7
    • 77949503891 scopus 로고    scopus 로고
    • Idea: Opcode-sequence-based malware detection
    • Engineering Secure Software and System
    • Igor Santos, Felix Brezo, Javier Nieves, et al, Idea: Opcode-Sequence-Based Malware Detection, Lecture Notes in Computer Science, Engineering Secure Software and System, vol 5969, pp. 35-43, 2010.
    • (2010) Lecture Notes in Computer Science , vol.5969 , pp. 35-43
    • Santos, I.1    Brezo, F.2    Nieves, J.3
  • 8
    • 71849087786 scopus 로고    scopus 로고
    • Using a bioinformatics approach to generate accurate exploit-based signatures for polymorphic worms
    • Yong Tang, Bin Xiao, Xicheng Lu, Using a bioinformatics approach to generate accurate exploit-based signatures for polymorphic worms, Journal of Computer & Security, vol 28, pp. 827-842, 2009.
    • (2009) Journal of Computer & Security , vol.28 , pp. 827-842
    • Tang, Y.1    Xiao, B.2    Lu, X.3
  • 9
    • 71849087786 scopus 로고    scopus 로고
    • Using a bioinformatics approach to generate accurate exploit-based signatures for polymorphic worms
    • Yong Tang, Bin Xiao, Xicheng Lu, Using a bioinformatics approach to generate accurate exploit-based signatures for polymorphic worms, Journal of Computer & Security, vol 28, pp. 827-842, 2009.
    • (2009) Journal of Computer & Security , vol.28 , pp. 827-842
    • Tang, Y.1    Xiao, B.2    Lu, X.3
  • 10
    • 77954701461 scopus 로고    scopus 로고
    • Improving the efficiency of dynamic malware analysis
    • Track on Information Security Research and Applications, Lusanne, Switzerland, March
    • Ulrich Bayer, Engin Kirda and Christopher Kruegel, "Improving the Efficiency of Dynamic Malware Analysis", Proceedings of the 2010 ACM Symposium on Applied Computing, Track on Information Security Research and Applications, Lusanne, Switzerland, March 2010.
    • (2010) Proceedings of the 2010 ACM Symposium on Applied Computing
    • Bayer, U.1    Kirda, E.2    Kruegel, C.3
  • 11
    • 78049363272 scopus 로고    scopus 로고
    • Malware self protection mechanism issues in conducting malware behavior analysis in a virtual environment as compared to a real environment
    • September
    • Alsagoff, S.N, Malware self protection mechanism issues in conducting malware behavior analysis in a virtual environment as compared to a real environment, 2010 International Symposium in Information Technology (ITSim), vol 3, pp.1326-1331, September 2010.
    • (2010) 2010 International Symposium in Information Technology (ITSim) , vol.3 , pp. 1326-1331
    • Alsagoff, S.N.1
  • 14
  • 16
    • 49949117136 scopus 로고    scopus 로고
    • On the limits of information flow techniques for malware analysis and containment
    • Detection of Intrusion and Malware, and Vulnerability Assessment
    • Lorenzo Cavallaro, Prateek Saxena and R.Sekar, On the limits of information flow techniques for malware analysis and containment, Lecture Notes in Computer Science, Vol 5137, Detection of Intrusion and Malware, and Vulnerability Assessment, pp. 143-163, 2008.
    • (2008) Lecture Notes in Computer Science , vol.5137 , pp. 143-163
    • Cavallaro, L.1    Saxena, P.2    Sekar, R.3
  • 21
    • 81255211647 scopus 로고    scopus 로고
    • Polymorphic Code: http://en.wikipedia.org/wiki/Polymorphic-code
  • 23
    • 0037269111 scopus 로고    scopus 로고
    • Reliable identification of bounded-length viruses is NP-complete
    • January
    • Spinellis, D, Reliable identification of bounded-length viruses is NP-complete. Information Theory, IEEE Transactions, Vol 49, pp. 280-284, January 2003.
    • (2003) Information Theory IEEE Transactions , vol.49 , pp. 280-284
    • Spinellis, D.1
  • 26
    • 81255177014 scopus 로고    scopus 로고
    • Metamorphic Code: http://en.wikipedia.org/wiki/Metamorphic-code


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.