메뉴 건너뛰기




Volumn , Issue , 2011, Pages 912-917

Malware virtualization-resistant behavior detection

Author keywords

[No Author keywords available]

Indexed keywords

BEHAVIOR DETECTION; DISTANCE ALGORITHM; MALICIOUS SOFTWARE; MALWARE ANALYSIS; MALWARES; REAL SYSTEMS; VIRTUAL ENVIRONMENTS; VIRTUAL MACHINES;

EID: 84863066873     PISSN: 15219097     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICPADS.2011.78     Document Type: Conference Paper
Times cited : (20)

References (23)
  • 1
    • 84870565251 scopus 로고    scopus 로고
    • Process monitor. http://technet.microsoft.com/en-us/sysinternals/ bb896645.aspx.
    • Process Monitor
  • 2
    • 84863055987 scopus 로고    scopus 로고
    • Putty. http://www.chiark.greenend.org.uk/∼sgtatham/putty/.
    • Putty
  • 3
    • 84863080356 scopus 로고    scopus 로고
    • Qemu. http://bellard.org/qemu/.
    • Qemu
  • 4
    • 33750543292 scopus 로고    scopus 로고
    • Red pill. http://invisiblethings.org/papers/redpill.html.
    • Red Pill
  • 5
    • 84863046446 scopus 로고    scopus 로고
    • Scoopyng. http://www.trapkit.de/research/vmm/scoopydoo/index.html.
    • Scoopyng
  • 7
    • 84863079354 scopus 로고    scopus 로고
    • Vmware. https://www.vmware.com.
    • Vmware
  • 11
    • 53349116756 scopus 로고    scopus 로고
    • Towards an understanding of anti-virtualization and anti-debugging behavior in modern malware
    • X. Chen, J. Andersen, Z. M. Mao, M. Bailey, and J. Nazario. Towards an understanding of anti-virtualization and anti-debugging behavior in modern malware. In Dependable Systems and Networks, pages 177-186, 2008.
    • (2008) Dependable Systems and Networks , pp. 177-186
    • Chen, X.1    Andersen, J.2    Mao, Z.M.3    Bailey, M.4    Nazario, J.5
  • 12
    • 84863056604 scopus 로고    scopus 로고
    • Anti-emulation through time-lock puzzles
    • Hoofddorp, Netherlands, May
    • T. Ebringer. Anti-emulation through time-lock puzzles. In Second International CARO Workshop, Hoofddorp, Netherlands, May 2008.
    • (2008) Second International CARO Workshop
    • Ebringer, T.1
  • 20
    • 0001116877 scopus 로고
    • Binary codes capable of correcting deletions, insertions and reversals
    • V. Levenshtein. Binary Codes Capable of Correcting Deletions, Insertions and Reversals. Soviet Physics Doklady, 10:707, 1966.
    • (1966) Soviet Physics Doklady , vol.10 , pp. 707
    • Levenshtein, V.1
  • 22
    • 38149030181 scopus 로고    scopus 로고
    • Detecting system emulators
    • J. A. Garay, A. K. Lenstra, M. Mambo, and R. Peralta, editors, Volume 4779 of Lecture Notes in Computer Science, Springer
    • T. Raffetseder, C. Krgel, and E. Kirda. Detecting system emulators. In J. A. Garay, A. K. Lenstra, M. Mambo, and R. Peralta, editors, ISC, volume 4779 of Lecture Notes in Computer Science, pages 1-18. Springer, 2007.
    • (2007) ISC , pp. 1-18
    • Raffetseder, T.1    Krgel, C.2    Kirda, E.3
  • 23
    • 85084161596 scopus 로고    scopus 로고
    • Analysis of the intel pentium's ability to support a secure virtual machine monitor
    • Berkeley, CA, USA, USENIX Association
    • J. S. Robin and C. E. Irvine. Analysis of the intel pentium's ability to support a secure virtual machine monitor. In Proceedings of the 9th conference on USENIX Security Symposium - Volume 9, pages 10-10, Berkeley, CA, USA, 2000. USENIX Association.
    • (2000) Proceedings of the 9th Conference on USENIX Security Symposium , vol.9 , pp. 10-10
    • Robin, J.S.1    Irvine, C.E.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.