메뉴 건너뛰기




Volumn , Issue , 2012, Pages 227-237

V2E: Combining hardware virtualization and software emulation for transparent and extensible malware analysis

Author keywords

emulation; emulation resistant; hardware virtualization; malware; qemu; record and replay

Indexed keywords

EMULATION; EMULATION RESISTANT; MALWARES; QEMU; RECORD-AND-REPLAY;

EID: 84863351787     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2151024.2151053     Document Type: Conference Paper
Times cited : (43)

References (41)
  • 1
    • 84872303584 scopus 로고    scopus 로고
    • adore-ng
    • adore-ng. adore-ng rootkit. http://stealth.openwall.net/rootkits/.
    • Adore-ng Rootkit
  • 2
    • 84863355266 scopus 로고    scopus 로고
    • anubis
    • anubis. Anubis: Analyzing Unknown Binaries. http://anubis.iseclab.org/.
  • 16
    • 38349023177 scopus 로고    scopus 로고
    • Attacks on virtual machine emulators
    • December
    • P. Ferrie. Attacks on virtual machine emulators. Symantec Security Response, December 2006.
    • (2006) Symantec Security Response
    • Ferrie, P.1
  • 23
    • 84863355040 scopus 로고    scopus 로고
    • kvm. Kernel Based Virtual Machine. http://www.linux-kvm.org/.
  • 30
    • 84863355041 scopus 로고    scopus 로고
    • Qemu
    • qemulink. Qemu. http://fabrice.bellard.free.fr/qemu/.
    • Qemulink
  • 39
    • 84863391482 scopus 로고    scopus 로고
    • Vmware
    • vmware. Vmware. http://www.vmware.com/.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.