메뉴 건너뛰기




Volumn 8, Issue 1-2, 2012, Pages 1-13

Shadow attacks: Automatically evading system-call-behavior based malware detection

Author keywords

[No Author keywords available]

Indexed keywords

BEHAVIOR-BASED; BEHAVIOR-BASED DETECTION; CODE OBFUSCATION; CURRENT GENERATION; DETECTION TECHNIQUE; MALICIOUS BEHAVIOR; MALWARE ANALYSIS; MALWARE DETECTION; MALWARES; MULTI CORE; POTENTIAL THREATS; PROTOTYPE TOOLS; SECURITY PROBLEMS; SOURCE CODES; SYSTEM-CALL SEQUENCE;

EID: 84860630143     PISSN: 17729890     EISSN: 17729904     Source Type: Journal    
DOI: 10.1007/s11416-011-0157-5     Document Type: Article
Times cited : (73)

References (34)
  • 6
    • 34249847782 scopus 로고    scopus 로고
    • Formalisation and implementation aspects of k-ary (malicious) codes
    • (EICAR 2007 Best Academic Papers)
    • Filiol, E.: Formalisation and implementation aspects of k-ary (malicious) codes. J. Comput. Virol. 3(3), 75-86 (2007) (EICAR 2007 Best Academic Papers).
    • (2007) J. Comput. Virol , vol.3 , Issue.3 , pp. 75-86
    • Filiol, E.1
  • 11
    • 84990479742 scopus 로고
    • An efficient heuristic procedure for partition graphs
    • Kernighan, B.W., Lin, S.: An efficient heuristic procedure for partition graphs. Bell Syst. Tech. J. 49, 291-307 (1970).
    • (1970) Bell Syst. Tech. J , vol.49 , pp. 291-307
    • Kernighan, B.W.1    Lin, S.2
  • 13
    • 84860614597 scopus 로고    scopus 로고
    • Anubis
    • Anubis. http://anubis.iseclab.org/.
  • 14
    • 0017996760 scopus 로고
    • Time, clocks, and the ordering of events in a distributed system
    • Lamport, L.: Time, clocks, and the ordering of events in a distributed system. Commun. ACM 21(7), 558-565 (1978).
    • (1978) Commun. ACM , vol.21 , Issue.7 , pp. 558-565
    • Lamport, L.1
  • 20
    • 0023294949 scopus 로고
    • Computer viruses: Theory and experiments
    • Cohen, F.: Computer viruses: theory and experiments. Comput. Secur. 6(1), 22-35 (1987).
    • (1987) Comput. Secur , vol.6 , Issue.1 , pp. 22-35
    • Cohen, F.1
  • 21
    • 84860615754 scopus 로고    scopus 로고
    • Phoenix
    • Phoenix. https://connect.microsoft.com/Phoenix.
  • 28
    • 84860620384 scopus 로고    scopus 로고
    • Norman Sandbox Whitepaper
    • Norman Sandbox Whitepaper. http://www.norman.com.
  • 31
    • 33646805500 scopus 로고    scopus 로고
    • Cache missing for fun and profit
    • Percival, C.: Cache missing for fun and profit. BSDCan (2005). http://www.daemonology.net/hyperthreading-consideredharmful/.
    • (2005) BSDCan
    • Percival, C.1
  • 32
    • 0347215214 scopus 로고    scopus 로고
    • UNIX Network Programming
    • 2nd edn, Prentice Hall, Englewood Cliffs
    • Stevens, R.: UNIX Network Programming, 2nd edn. Interprocess Communications, vol. 2. Prentice Hall, Englewood Cliffs (1999).
    • (1999) Interprocess Communications , vol.2
    • Stevens, R.1
  • 34
    • 48349087890 scopus 로고    scopus 로고
    • Code obfuscation techniques for metamorphic viruses
    • doi:10.1007/s11416-008-0084-2
    • Borello, J., Mé, L.: Code obfuscation techniques for metamorphic viruses. J. Comput.Virol. 4, 211-220 (2008). doi:10.1007/s11416-008-0084-2.
    • (2008) J. Comput.Virol , vol.4 , pp. 211-220
    • Borello, J.1    Mé, L.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.