메뉴 건너뛰기




Volumn 7214 LNCS, Issue , 2012, Pages 110-125

Pushdown model checking for malware detection

Author keywords

[No Author keywords available]

Indexed keywords

EMPTINESS CHECKING; MALICIOUS BEHAVIOR; MALWARE DETECTION; MALWARES; MODEL CHECKING PROBLEM; PUSHDOWN MODELS; PUSHDOWN SYSTEMS; BRANCHING TIME; MALWARE WRITERS;

EID: 84859310292     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-28756-5_9     Document Type: Conference Paper
Times cited : (25)

References (21)
  • 1
    • 78649248594 scopus 로고    scopus 로고
    • free version
    • Avast antivirus, free version, http://www.avast.com
    • Avast Antivirus
  • 2
    • 84859304100 scopus 로고    scopus 로고
    • free version
    • Avira antivirus, free version, http://www.avira.com
    • Avira Antivirus
  • 3
    • 84859348337 scopus 로고    scopus 로고
    • IDA Pro, http://www.hex-rays.com/idapro/
    • IDA Pro
  • 8
    • 0026913667 scopus 로고
    • Symbolic boolean manipulation with ordered binary-decision diagrams
    • Bryant, R.E.: Symbolic boolean manipulation with ordered binary-decision diagrams. ACM Comput. Surv. 24(3) (1992)
    • (1992) ACM Comput. Surv. , vol.24 , Issue.3
    • Bryant, R.E.1
  • 10
    • 58049219641 scopus 로고    scopus 로고
    • Mining specifications of malicious behavior
    • Christodorescu, M., Jha, S., Kruegel, C.: Mining specifications of malicious behavior. In: ISEC (2008)
    • (2008) ISEC
    • Christodorescu, M.1    Jha, S.2    Kruegel, C.3
  • 12
    • 0142121527 scopus 로고    scopus 로고
    • Model checking LTL with regular valuations for push-down systems
    • Esparza, J., Kucera, A., Schwoon, S.: Model checking LTL with regular valuations for push-down systems. Inf. Comput. 186(2) (2003)
    • (2003) Inf. Comput. , vol.186 , Issue.2
    • Esparza, J.1    Kucera, A.2    Schwoon, S.3
  • 13
    • 84958757867 scopus 로고    scopus 로고
    • A BDD-Based Model Checker for Recursive Programs
    • Computer Aided Verification
    • Esparza, J., Schwoon, S.: A BDD-Based Model Checker for Recursive Programs. In: Berry, G., Comon, H., Finkel, A. (eds.) CAV 2001. LNCS, vol. 2102, pp. 324-336. Springer, Heidelberg (2001) (Pubitemid 33312928)
    • (2001) LECTURE NOTES IN COMPUTER SCIENCE , Issue.2102 , pp. 324-336
    • Esparza, J.1    Schwoon, S.2
  • 15
    • 38449121202 scopus 로고    scopus 로고
    • Using Verification Technology to Specify and Detect Malware
    • Moreno Díaz, R., Pichler, F., Quesada Arencibia, A. (eds.) EUROCAST 2007 Springer, Heidelberg
    • Holzer, A., Kinder, J., Veith, H.: Using Verification Technology to Specify and Detect Malware. In: Moreno Díaz, R., Pichler, F., Quesada Arencibia, A. (eds.) EUROCAST 2007. LNCS, vol. 4739, pp. 497-504. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4739 , pp. 497-504
    • Holzer, A.1    Kinder, J.2    Veith, H.3
  • 16
    • 26444526878 scopus 로고    scopus 로고
    • Detecting malicious code by model checking
    • Detection of Instructions and Malware, and Vulnerability Assessment: Second International Conference, DIMVA 2005. Proceedings
    • Kinder, J., Katzenbeisser, S., Schallhart, C., Veith, H.: Detecting Malicious Code by Model Checking. In: Julisch, K., Krügel, C. (eds.) DIMVA 2005. LNCS, vol. 3548, pp. 174-187. Springer, Heidelberg (2005) (Pubitemid 41423155)
    • (2005) Lecture Notes in Computer Science , vol.3548 , pp. 174-187
    • Kinder, J.1    Katzenbeisser, S.2    Schallhart, C.3    Veith, H.4
  • 18
    • 84859363174 scopus 로고    scopus 로고
    • Context-sensitive analysis of obfuscated x86 executables
    • Lakhotia, A., Boccardo, D.R., Singh, A., Manacero, A.: Context-sensitive analysis of obfuscated x86 executables. In: PEPM (2010)
    • (2010) PEPM
    • Lakhotia, A.1    Boccardo, D.R.2    Singh, A.3    Manacero, A.4
  • 19
    • 33751120104 scopus 로고    scopus 로고
    • A method for detecting obfuscated calls in malicious binaries
    • Lakhotia, A., Kumar, E.U., Venable, M.: A method for detecting obfuscated calls in malicious binaries. IEEE Trans. Software Eng. 31(11) (2005)
    • (2005) IEEE Trans. Software Eng. , vol.31 , Issue.11
    • Lakhotia, A.1    Kumar, E.U.2    Venable, M.3
  • 20
    • 84946414079 scopus 로고    scopus 로고
    • Static verification of worm and virus behavior in binary executables using model checking
    • Singh, P.K., Lakhotia, A.: Static verification of worm and virus behavior in binary executables using model checking. In: IAW (2003)
    • (2003) IAW
    • Singh, P.K.1    Lakhotia, A.2
  • 21
    • 80052873279 scopus 로고    scopus 로고
    • Efficient CTL Model-Checking for Pushdown Systems
    • Katoen, J.-P., König, B. (eds.) CONCUR 2011 Springer, Heidelberg
    • Song, F., Touili, T.: Efficient CTL Model-Checking for Pushdown Systems. In: Katoen, J.-P., König, B. (eds.) CONCUR 2011. LNCS, vol. 6901, pp. 434-449. Springer, Heidelberg (2011)
    • (2011) LNCS , vol.6901 , pp. 434-449
    • Song, F.1    Touili, T.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.