메뉴 건너뛰기




Volumn 41, Issue 1, 2012, Pages 107-128

Recognizing malicious software behaviors with tree automata inference

Author keywords

Behavioral malware detection; Tree automata inference

Indexed keywords

DATAFLOW; DEPENDENCY GRAPHS; MALICIOUS SOFTWARE; MALWARE DETECTION; MALWARES; SYSTEM CALLS; TREE AUTOMATA;

EID: 84863215860     PISSN: 09259856     EISSN: None     Source Type: Journal    
DOI: 10.1007/s10703-012-0149-1     Document Type: Conference Paper
Times cited : (8)

References (37)
  • 4
    • 70349990723 scopus 로고    scopus 로고
    • Architecture of a morphological malware detector
    • 10.1007/s11416-008-0102-4
    • G Bonfante M Kaczmarek J-Y Marion 2009 Architecture of a morphological malware detector J Comput Virol 5 263 270 10.1007/s11416-008-0102-4
    • (2009) J Comput Virol , vol.5 , pp. 263-270
    • Bonfante, G.1    Kaczmarek, M.2    Marion, J.-Y.3
  • 12
    • 21644482450 scopus 로고    scopus 로고
    • Minos: Control data attack prevention orthogonal to memory model
    • IEEE Press New York
    • Crandall J, Chong F (2005) Minos: control data attack prevention orthogonal to memory model. In: Proc of the 37th int symp on microarchitecture. IEEE Press, New York, pp 221-232
    • (2005) Proc of the 37th Int Symp on Microarchitecture , pp. 221-232
    • Crandall, J.1    Chong, F.2
  • 15
    • 0006776326 scopus 로고
    • Technical report, Dept. Syst. Inform. Comput., Univ. Politecnica Valencia, Valencia, Spain
    • García P (1993) Learning k-testable tree sets from positive data. Technical report, Dept. Syst. Inform. Comput., Univ. Politecnica Valencia, Valencia, Spain
    • (1993) Learning K-testable Tree Sets from Positive Data
    • García, P.1
  • 16
    • 0025484018 scopus 로고
    • Inference of k-testable languages in the strict sense and application to syntactic pattern recognition
    • 10.1109/34.57687
    • P García E Vidal 1990 Inference of k-testable languages in the strict sense and application to syntactic pattern recognition IEEE Trans Pattern Anal Mach Intell 12 920 925 10.1109/34.57687
    • (1990) IEEE Trans Pattern Anal Mach Intell , vol.12 , pp. 920-925
    • García, P.1    Vidal, E.2
  • 18
    • 0001187706 scopus 로고
    • Complexity of automaton identification from given data
    • 495194 0376.68041 10.1016/S0019-9958(78)90562-4
    • EM Gold 1978 Complexity of automaton identification from given data Inf Control 37 3 302 320 495194 0376.68041 10.1016/S0019-9958(78)90562-4
    • (1978) Inf Control , vol.37 , Issue.3 , pp. 302-320
    • Gold, E.M.1
  • 19
    • 38449121202 scopus 로고    scopus 로고
    • Using verification technology to specify and detect malware
    • Springer Berlin
    • Holzer A, Kinder J, Veith H (2007) Using verification technology to specify and detect malware. In: Lecture notes in computer science, vol 4739. Springer, Berlin, pp 497-504
    • (2007) Lecture Notes in Computer Science , vol.4739 , pp. 497-504
    • Holzer, A.1    Kinder, J.2    Veith, H.3
  • 23
    • 0016971687 scopus 로고
    • Symbolic execution and program testing
    • 0329.68018 10.1145/360248.360252
    • JC King 1976 Symbolic execution and program testing Commun ACM 19 7 385 394 0329.68018 10.1145/360248.360252
    • (1976) Commun ACM , vol.19 , Issue.7 , pp. 385-394
    • King, J.C.1
  • 31
    • 27544444280 scopus 로고    scopus 로고
    • Dynamic taint analysis: Automatic detection, analysis, and signature generation of exploit attacks on commodity software
    • Newsome J, Song D (2005) Dynamic taint analysis: automatic detection, analysis, and signature generation of exploit attacks on commodity software. In: Proc of the network and distributed systems security symposium
    • (2005) Proc of the Network and Distributed Systems Security Symposium
    • Newsome, J.1    Song, D.2
  • 32
    • 12844267418 scopus 로고    scopus 로고
    • Secure program execution via dynamic information flow tracking
    • 10.1145/1037949.1024404
    • G Suh J Lee D Zhang S Devadas 2004 Secure program execution via dynamic information flow tracking Oper Syst Rev 38 5 85 96 10.1145/1037949.1024404
    • (2004) Oper Syst Rev , vol.38 , Issue.5 , pp. 85-96
    • Suh, G.1    Lee, J.2    Zhang, D.3    Devadas, S.4
  • 35
    • 0038011184 scopus 로고    scopus 로고
    • Mimicry attacks on host-based intrusion detection systems
    • ACM Press New York. 10.1145/586110.586145
    • Wagner D, Soto P (2002) Mimicry attacks on host-based intrusion detection systems. In: CCS'02: proc of the 9th ACM conf on comp and comm security. ACM Press, New York, pp 255-264
    • (2002) CCS'02: Proc of the 9th ACM Conf on Comp and Comm Security , pp. 255-264
    • Wagner, D.1    Soto, P.2
  • 37
    • 0012883458 scopus 로고
    • Locally testable languages
    • 307538 0242.68038 10.1016/S0022-0000(72)80020-5
    • Y Zalcstein 1972 Locally testable languages J Comput Syst Sci 6 2 151 167 307538 0242.68038 10.1016/S0022-0000(72)80020-5
    • (1972) J Comput Syst Sci , vol.6 , Issue.2 , pp. 151-167
    • Zalcstein, Y.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.