메뉴 건너뛰기




Volumn , Issue , 2012, Pages 231-235

Malware analysis with multiple features

Author keywords

feature selection; malware; static analysis

Indexed keywords

DEBUGGERS; MALWARE ANALYSIS; MALWARES; MICROSOFT WINDOWS; MULTIPLE FEATURES; PYTHON PROGRAMMING LANGUAGE; STATIC AND DYNAMIC ANALYSIS; STATIC FEATURES; VIRTUAL MACHINES;

EID: 84863098541     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/UKSim.2012.40     Document Type: Conference Paper
Times cited : (18)

References (17)
  • 3
    • 84863103029 scopus 로고    scopus 로고
    • Accessed at January 10, 2012
    • J. Koret, "Zero wine," http://zerowine.sourceforge.net, (Accessed at January 10, 2012).
    • Zero Wine
    • Koret, J.1
  • 4
    • 84863107551 scopus 로고    scopus 로고
    • Accessed at January 9, 2012
    • T. Rudnai, "Crypto-analysis in shellcode detection," http://community.websense.com/blogs/securitylabs/archive/2010/06/03/ crypto-analysis-in-shellcode-detection.aspx, 2010, (Accessed at January 9, 2012).
    • (2010) Crypto-analysis in Shellcode Detection
    • Rudnai, T.1
  • 5
    • 84863091341 scopus 로고    scopus 로고
    • Accessed at January 9,2012
    • D. Steven, "Xorsearch," http://blog.didierstevens.com/programs/ xorsearch/, 2010, (Accessed at January 9,2012).
    • (2010) Xorsearch
    • Steven, D.1
  • 7
    • 81755176870 scopus 로고    scopus 로고
    • Computer virus detection using features ranking and machine learning
    • A. Altaher, S. Ramadass, and A. Ali, "Computer virus detection using features ranking and machine learning," Australian Journal of Basic and Applied Sciences, vol. 5, no. 9, pp. 1482-1486, 2011.
    • (2011) Australian Journal of Basic and Applied Sciences , vol.5 , Issue.9 , pp. 1482-1486
    • Altaher, A.1    Ramadass, S.2    Ali, A.3
  • 8
    • 77951112979 scopus 로고    scopus 로고
    • A system for analyzing advance bot behavior
    • Information Systems, Technology and Management, ser. S. K. Prasad, H. M. Vin, S. Sahni, M. P. Jaiswal, and B. Thipakorn, Eds. Springer Berlin Heidelberg
    • J. Oh, C. Im, and H. Jeong, "A system for analyzing advance bot behavior," in Information Systems, Technology and Management, ser. Communications in Computer and Information Science, S. K. Prasad, H. M. Vin, S. Sahni, M. P. Jaiswal, and B. Thipakorn, Eds. Springer Berlin Heidelberg, 2010, vol. 54, pp. 56-63.
    • (2010) Communications in Computer and Information Science , vol.54 , pp. 56-63
    • Oh, J.1    Im, C.2    Jeong, H.3
  • 9
    • 84924223669 scopus 로고    scopus 로고
    • Static analysis of executables to detect malicious patterns
    • USENIX Association. USENIX Association, Aug. [Online]. Available
    • M. Christodorescu and S. Jha, "Static analysis of executables to detect malicious patterns," in Proceedings of the 12th USENIX Security Symposium (Security'03), USENIX Association. USENIX Association, Aug. 2003, pp. 169-186. [Online]. Available: http://www.cs.wisc.edu/~mihai/mywork/papers/index. htmln#11
    • (2003) Proceedings of the 12th USENIX Security Symposium (Security'03) , pp. 169-186
    • Christodorescu, M.1    Jha, S.2
  • 12
    • 84867345538 scopus 로고    scopus 로고
    • October Accessed at January 11, 2012
    • M. N. A. Zabidi, "Compiling features for malicious software," http://conference.hitb.org/hitbsecconf2011kul/materials/D1%20SIGINT%20- %20Muhammad%20Najmi% 20Ahmad%20Zabidi%20-%20Compiling%20Features% 20for%20Malcious%20Binaries.pdf, October 2011, (Accessed at January 11, 2012).
    • (2011) Compiling Features for Malicious Software
    • Zabidi, M.N.A.1
  • 14
    • 84863091343 scopus 로고    scopus 로고
    • March Accessed at January 11, 2012
    • Wikibooks, "X86 disassembly," http://en.wikibooks.org/wiki/X86 Disassembly/Debugger Detectors, March 2008, (Accessed at January 11, 2012).
    • (2008) X86 Disassembly
  • 15
    • 34047129159 scopus 로고    scopus 로고
    • Using entropy analysis to find encrypted and packed malware
    • R. Lyda and J. Hamrock, "Using entropy analysis to find encrypted and packed malware," Security & Privacy, IEEE, vol. 5, no. 2, pp. 40-45, 2007.
    • (2007) Security & Privacy, IEEE , vol.5 , Issue.2 , pp. 40-45
    • Lyda, R.1    Hamrock, J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.